User Manual-SRD-1694,1685-ENGLISH - Web-0519
User Manual-SRD-1694,1685-ENGLISH - Web-0519
Copyright
©2016 Hanwha Techwin Co., Ltd. All rights reserved.
Trademark
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of
their respective company.
Restriction
Copyright of this document is reserved. Under no circumstances, this document shall be reproduced, distributed or changed, partially or wholly,
without formal authorization.
Disclaimer
Samsung makes the best to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of
this document and the subsequent results shall be entirely on the user's own responsibility. Samsung reserves the right to change the contents of this
document without prior notice.
The default administrator ID is “admin”, and the password must be set when the user log in at the first time.
Set password for your wireless network if you use the product with a wireless router. Being not protected with password or using the
default wireless router password may expose your video data to potential threat.
To prevent from your personal information being exposed, please change your password every 3 months. Note that the security and
other related issues caused by careless management of password shall be be in the charge of the user.
overview
IMPORTANT SAFETY INSTRUCTIONS
Read these operating instructions carefully before using the unit.
Follow all the safety instructions listed below.
Keep these operating instructions handy for future reference.
● OVERVIEW
1) Read these instructions.
2) Keep these instructions.
3) Heed all warnings.
4) Follow all instructions.
5) Do not use this apparatus near water.
6) Clean only with dry cloth.
7) Do not block any ventilation openings, Install in accordance with the manufacturer’s instructions.
8) Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus
(including amplifiers) that produce heat.
9) Do not defeat the safety purpose of the polarized or grounding- type plug. A polarized plug has two
blades with one wider than the other. A grounding type plug has two blades and a third grounding
prong. The wide blade or the third prong are provided for your safety. if the provided plug does not fit
into your outlet, consult an electrician for replacement of the obsolete outlet.
10) Protect the power cord from being walked on or pinched particularly at plugs, convenience
receptacles, and the point where they exit from the apparatus.
11) Only use attachments/accessories specified by the manufacturer.
12) Use only with the cart, stand, tripod, bracket, or table specified by the
manufacturer, or sold with the apparatus. When a cart is used, use caution
when moving the cart/apparatus combination to avoid injury from tip-over.
13) Unplug this apparatus during lightning storms or when unused for long periods
of time.
14) Refer all servicing to qualified service personnel. Servicing is required when the
apparatus has been damaged in any way, such as power-supply cord or plug is
damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus has been
exposed to rain or moisture, does not operate normally, or has been dropped.
English _3
overview
BEFORE START
This manual provides operational information necessary for using the product and contains a description about each
component part and its function as well as menu or network settings.
You have to keep in mind the following notices :
• SAMSUNG retains the copyright on this manual.
• This manual cannot be copied without SAMSUNG’s prior written approval.
• We are not liable for any or all losses to the product incurred by your use of non-standard product or violation of
instructions mentioned in this manual.
• Prior to opening the case, please consult a qualified technician first. Whenever this is needed power must be
removed from the unit.
• Before installing additional HDD or connecting the SATA device to this product, check if it is compatible with the
product.
Warning
Battery
It is essential that when changing the battery in the unit, the replacement battery must be of the same type
otherwise there may be a possibility of an explosion.
The following are the specifications of the battery you are using now.
• Normal voltage : 3V
CALIFORNIA USA ONLY
• Normal capacity : 220mAh This Perchlorate warning applies only to primary CR (Manganese Dioxide)
• Discharge Current : 0.2mA Lithium coin cells in the product sold or distributed ONLY in California USA.
“Perchlorate Material - special handling may apply,
• Operating temperature : -20°C ~ +85°C See www.dtsc.ca.gov/hazardouswaste/perchlorate.”
(-4°F ~ +185°F)
Caution
• Connect the power cord into a grounded outlet.
• The Mains plug is used as a disconnect device and shall stay readily operable at any time.
• Batteries shall not be exposed to excessive heat such as sunshine, fire or the like.
• Risk of Explosion if Battery is replaced by an Incorrect Type. Dispose of Used Batteries According to the
Instructions.
System Shutdown
Turning off the power while the product is in operation, or undertaking improper actions may cause damage
or malfunction to the hard drive or the product.
To safely cut off power, press the front Power button on the product to display the confirmation message.
Click <OK> and then unplug the power cable.
You may want to install a UPS system for safe operation in order to prevent damage caused by an
unexpected power stoppage. (Any questions concerning UPS, consult your UPS retailer.)
4_ overview
Operating Temperature
The guaranteed operating temperature range of this product is 0°C ~ 40°C (32°F ~ 104°F).
This product may not work properly if you run right after a long period of storage at a temperature below the
guaranteed one.
Prior to using a device that has been stored for a long period in low temperatures, allow the product to stand
at room temperature for a period.
Especially for the built-in HDD in the product, its guaranteed temperature range is 5°C ~ 55°C (41°F ~ 131°F).
Likewise, the hard drive may not work at a temperature below the guaranteed one.
● OVERVIEW
Ethernet Port
This equipment is in door use and all the communication wirings are limited to inside of the building.
Security Precautions
The default administrator ID is “admin”, and the password must be set when the user log in at the first time.
Set password for your wireless network if you use the product with a wireless router. Being not protected with
password or using the default wireless router password may expose your video data to potential threat.
To prevent from your personal information being exposed, please change your password every 3 months.
Note that the security and other related issues caused by careless management of password shall be be in the
charge of the user.
English _5
overview
CONTENTS
3 6
8
10
Contents
Features
Part Names and Functions (Front)
12 Part Names and Functions (Rear)
13 Remote Control
21
LIVE 25 Getting Started
28 Live Screen Configuration
25 33
35
36
Live Mode
Spot Out
Zoom
36 Audio ON/OFF
36 Freeze
37 Event Monitoring
38 58
61
64
Setting the Recording
Setting the Event
Backup
66 Network Configuration
79 Controlling a PTZ device
6_ overview
SEARCH & PLAY 82 Search
85 Playback
82
WEB VIEWER 87 Introducing Web Viewer
88 Connecting Web Viewer (Windows)
87
● OVERVIEW
90 Using Live Viewer (Windows)
95 Controlling a Connected PTZ Camera
98 Using Search Viewer
101 Viewer Setup
113 Information
114 Connecting Web Viewer (Mac)
116 Using Live Viewer (Mac)
117 Mobile Viewer
118
APPENDIX 120 Product Specification
123 Product Overview
120 124
128
131
Default Setting
Troubleshooting
Open Source Announcement
English _7
overview
FEATURES
The product compresses camera inputs from 16 channels with H.264 video codec, and supports simultaneous
recording and playback of 16-channel audio input to/from HDD.
These DVRs also supports network connectivity, providing remote monitoring from a remote PC transferring video and
audio data.
• Provides a convenient User Interface
• 16 CH Composite Input Connectors
• Supports CIF/2CIF/4CIF/WD1/720P/1080P recording formats
• With the network specific codec, network transfer enabled regardless of the recording conditions
• Display of HDD information and status by using HDD SMART
• CODEC performance : SRD-1685: NTSC: Up to 192fps@1920 x 1080 / PAL: Up to 192fps@1920 x 1080
SRD-1694: NTSC: Up to 480fps@1920 x 1080 / PAL: Up to 400fps@1920 x 1080
• HDD overwrite function
• Mass storage HDD backup through high-speed USB 2.0
• Simultaneous Record and Playback of 16-channel video data
• Various Search Modes (Time, Event, Backup, POS, Motion Detection)
• Various Recording Modes (Manual, Event, Scheduled Recording)
• Alarm Interface
• Remote Monitoring function by Network Viewer, Smart Viewer and Mobile Viewer
• Supports coaxial and RS-485 protocols
• Tampering Detection
8_ overview
Standards Approvals
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the
M FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment.
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with
the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a
● OVERVIEW
residential area is likely to cause harmful interference in which case the user will be required to correct the interference at
his own expense.
Package Contents
Please unwrap the product, and place the product on a flat place or in the place to be installed.
Please check the following contents are included in addition to the main unit.
The appearance of the components may differ from the image shown.
M Accessory category and quantity may differ depending on sales region.
For some regions, HDD is not pre-installed. HDD Fixing Screw, SATA Power Cable, SATA data cable and SATA power/data
cable quantity vary depending on the model.
USB
Remote Control /
Mouse User Manual or Quick Manual
Remote Control Battery (AAA)
English _9
overview
PART NAMES AND FUNCTIONS (FRONT)
b c
USB
Channel Used to select channel numbers directly in the Live Mode, or numbers in the numeric input mode.
Power
Used to turn the DVR ON/OFF.
Functions only if the button was held for 3 seconds.
10_ overview
Part Names Functions
Each time you press the button in Live mode, the screen mode will be switched in sequence.
MODE
Each time you press the button in play mode, the screen mode will be switched in sequence.
AUDIO Sets Audio ON/OFF.
ALARM Cancels the ALARM LED and the audible alarm when the alarm is going off, and to remove the icon.
MENU/' Either goes to the system menu screen or moves to the upper menu from the lower menu.
ENTER Runs selected menu function.
● OVERVIEW
ZOOM : Sets the screen to the x2 digital zoom.
FREEZE : Runs the FREEZE function in the Live Mode.
Camera Control
BACKUP : Runs the BACKUP function.
SEARCH : Goes to the search screen.
In play mode, DVR playback steps forward video by 1 frame. In play mode, DVR playback steps backward video by 1 frame.
< Shuttle >
In play mode, DVR plays fast forward. In play mode, DVR plays fast reverse.
English _11
overview
PART NAMES AND FUNCTIONS (REAR)
b c
1 2 3 4 5 6 7 8
CH1 CH2
AUDIO IN
VIDEO IN
CH3 CH4 9 10 11 12 13 14 15 16
AUDIO OUT
NETWORK
SERIAL
NO NC NO NO NO
COM COM COM COM AUDIO IN CH5 ~ CH16 CONSOLE eSATA HDMI VGA OUT USB
G 1 2 3 4 5 6 7 8 G G 9 10111213141516 G
+ -+ - 1 2 3 4 G ALARM
TX RX ALARM OUT RESET ALARM IN
AUDIO IN Audio input signal port (RCA jack) and port for optional audio extension cable.
VGA OUT Composite Video Signal Output Port (VGA type connector).
12_ overview
REMOTE CONTROL
POWER REC
Displays the Exit pop up screen. Starts or ends the live recording.
● OVERVIEW
NUMBER [0~+10]
Used as the numeric input keys, or displays a single
channel.
ID
Sets the ID of the system.
PTZ Select 2 digits from 0 ~ 9 while pressing the ID Key.
Displays or ends PTZ.
T/W SCROLL ,.
Zooms in or out. Moves the menu scroll.
VIEW
SEARCH Runs the View function in the PTZ mode.
Displays the search menu.
MODE BACKUP
Changes the screen mode. Displays the Backup Menu.
MENU RETURN
Goes to the system menu screen. Returns to the previous screen.
Up/Down/Left/Right(▲▼◄ ►)/ENTER
Moves the cursor up/down/left/right, and runs the
Select Menu.
PRESET
Displays the Preset Setup. REC LOCK
Selects the recording lock function.
FREEZE
Freezes the screen temporarily. AUDIO
ZOOM Turns Audio on/off.
Runs the digital zoom (x2) function. ALARM
Cancels the Alarm.
Skip Backward (by unit time),
Slow Rewind, Slow Forward, Move Frame
Skip Forward (by unit time) While paused, moves to the previous/next frame.
English _13
overview
Using the Numeric buttons
CHANNEL 10 Press the [+10] button first, then press the 0 button again within 3 seconds.
CHANNEL 11–16 Press the [+10] button first, then press any number between 1 to 6 within 3 seconds.
If you want to change the remote control ID to 08: Press 0 and 8 in order while the [ID] button of the remote control is pressed.
M For changing the ID of remote device, refer to “Remote Devices”. (Page 54)
14_ overview
installation
Please take note of the followings before using this product.
• Do not use the product outdoor.
• Do not spill water or liquid in the connection part of the product.
• Do not impose the system to excessive shock or force.
• Do not pull out the power plug forcefully.
● INSTALLATION
• Do not disassemble the product on your own.
• Do not exceed the rated input/output range.
• Use a certified power cord only.
• For the product with an input ground, use a grounded power plug.
When the temperature rises inside the product, the product may
breakdown and the product life be shortened. Please pay attention to
the following recommendations before installation.
When mounting the product on a rack, comply with the following instructions.
1. Please ensure that the rack inside is not sealed.
2. Please ensure the air is circulated through the inlet/outlet as shown in the picture.
3. If you pile up the prudcts or other rack-mount devices as shown in figure 2, secure
room for ventilation or install a vent.
4. For natural air convection, place the inlet at the bottom of the rack and the outlet on top.
5. It is strongly recommended that a fan motor is installed at the inlet and the outlet for USB
air circulation. (Please fit a filter at the inlet to screen dust or foreign substances.) USB
6. Please maintain the temperature inside the rack or surrounding areas between 0°C
~ 40°C (32°F ~ 104°F) as shown in the figure 1.
USB
USB
Rack Mount Instructions - The following or similar rack-mount instructions are included USB
English _15
installation
RACK INSTALLATION
Install the Bracket-Rack as shown in the figure, and then fasten the
screws on both sides (2 screws on each side).
Remove the screws on the left and right side of the DVR before installation.
Fix the screws not to be loosened by vibrations.
<Separation> <Installation>
16_ installation
INSTALLING THE HDD
Make sure to unplug the power cord from the wall outlet to prevent possible electric shock, injury or product
damage.
Please consult your provider for further information on HDD installation since improper installation or settings may
damage the product.
Make sure to unplug the power cord from the wall outlet before proceeding with the installation.
● INSTALLATION
Please pay attention so that the data inside the HDD is not damaged.
Before adding a HDD, please check the compatibility with this product.
HDD is vulnerable to malfunction due to its sensitive nature especially against shock when operating.
Please ensure that the HDD is free from such shock.
We are not liable for any damage to the HDD incurred by user’s carelessness or miss use.
Cases might cause damage to HDD or recorded data
To minimize the risk of data loss from a damaged HDD, please backup data as often as possible.
If exposed to shock when disassembling or installing, data stored in the hard disk may be damaged.
A sudden power failure or turning off the product while in HDD operation may damage the hard disk drive.
HDD or files stored inside may be damaged if the main body is moved or impacted during the HDD operation.
1. When adding a new HDD, make sure to fasten screws tightly and use appropriate parts if required to fix
the HDD. Otherwise, the product may be damaged or does not operate properly.
2. Please check the HDD compatibility before adding a HDD.
Please contact your nearest dealer to obtain the list of compatible devices.
If the installed HDD had been used with other devices, it will be automatically formatted.
J
• If installing HDDs to SRD-1685
USB
English _17
installation
2. Loosen the screws (x4) in the left/right and upper
sides and remove the upper brackets.
Bracket
1
AUDIO CH1
2
IN CH2
3
CH3 4
CH4 VIDEO
IN 5
6
9 7
10 8
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NOC
NC NO
OM NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 10111213141
ALARM 516 G
IN AUDIO
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
1
AUDIO CH1
2
IN CH2
3
CH3 4
CH4 VIDEO
IN 5
6
9 7
10 8
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NOC
NC NO
OM NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 10111213141
ALARM 516 G
IN AUDIO
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
1
AUDIO CH1
2
IN CH2
3
CH3 4
CH4 VIDEO 5
IN
6
9 7
10 8
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NO
NC
COM NO NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 101112131
ALARM 41516
G AUDIO
IN
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
USB
18_ installation
• If installing HDDs to SRD-1694
USB
● INSTALLATION
2. Loosen the screws (x4) in the left/right and upper
sides and remove the upper brackets.
Bracket
1
AUDIO CH1
2
IN CH2
3
CH3 4
CH4 VIDEO
IN 5
6
9 7
10 8
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NOC
NC NO
OM NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 10111213141
ALARM 516 G
IN AUDIO
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
1
AUDIO CH1
2
IN CH2
3
CH3 4
CH4 VIDEO
IN 5
6
9 7
10 8
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NOC
NC NO
OM NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 10111213141
ALARM 516 G
IN AUDIO
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
English _19
installation
4. Connect the cable to the HDD by matching the Bracket
HDD SATA/power cable number to the HDD
position number on the bracket.
1
AUDIO CH1
2
IN CH2
3
CH3 4
CH4 VIDEO
IN 5
6
9 7
10 8
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NO
NC
COM NO NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 101112131
ALARM 41516
G AUDIO
IN
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
CH3
CH2
CH4 VIDEO
1
IN
9
2
10
3
4
5
6
7
8
figure below.
11
AUDIO
OUT 12
13
14
15
16
SERIAL
NOC
NC NO
OM NO
COM COMNO
+ -+ COM
- 1
TX RX 2
ALARM 3 4 G G 1
OUT ALARM 2 3 4
RESET 5 6 7
8 GG
9 10111213141
ALARM 516 G
IN AUDIO
IN CH5
~ CH16 NETWORK
CONSOLE
eSATA
HDMI
VGA OUT
USB
Please don’t pull off the cables with force, press the
M connector gently before removing HDD. 1
2
5
3
6
4
7
1
5
2
6
3
4
7
8
USB
20_ installation
connecting with other device
CONNECTING EXTERNAL DEVICES
AC 100-240V~IN
USB
~ CH16
IN CH5
AUDIO
HDMI
VIDEO IN
VIDEO OUT (VGA)
AUDIO IN AUDIO OUT
AUDIO IN SPOT eSATA HDD
If the USB storage media for backup is not formatted by the product, format it as FAT32 file system with a PC.
J
To prevent from USB ports being damaged, please unplug USB devices before openning the front cover.
English _21
connecting with other device
Connecting External SATA HDD (eSATA)
External SATA port is provided on the rear panel.
If connected to the system, the external SATA HDD (eSATA) can be recognized and configured in “Main Menu >
Device > Storage Device”.
Use a cable shorter than 1 m for the external external SATA HDD (eSATA) connections.
J
Unexpected disconnection to a device in use which is connected via eSATA may restart the system. Check whether the
device is in use before disconnecting it.
16
15
14
13
12
11
10
9
USB
~ CH16
IN CH5
AUDIO
Sensors
Alarm
16
USB
~ CH16
IN CH5
AUDIO
system keyboard
PTZ camera
You can connect and control the PTZ camera which supports the RS-485 communication.
M
Check if the RS-485 device is compatible with the product first.
Pay attention not to change the polarity (+/-) of the RS-485 device when connecting it.
Depending on camera’s type, connection polarity can be different.
For further information, refer to the respective PTZ Camera’s documentation.
16
15
14
13
12
11
USB
AUDIO
IN CH5
~ CH16
(Direct Cable)
Hub/Switcher
Bone Windows
Back
NETWORK Network Viewer
Hub/Switcher
English _23
connecting with other device
Connecting to the Network using the router
16
15
14
13
12
11
10
9
USB
~ CH16
IN CH5
AUDIO
Broadband Router
DDNS Server
(Data Center)
16
15
14
13
12
11
9
10
USB
RJ-45 Ethernet Cable
AUDIO
IN CH5
~ CH16
(Direct Cable)
PPPoE MODEM
E) Line Windows
(PPPo
Phone Network Viewer
NETWORK
Hub/Switcher
● LIVE
2. Touch and hold the front power button for over 3 seconds.
REC
REC
English _25
live
Shutting Down the System
You can shut down the system only if you have logged in to the DVR.
You require permission to shut down the system if you are not logged in as admin.
1. Hold the <Power> button on the front for over 3 seconds, 2015-01-01 01:10:25
or press Power button on the remote control once, or right
click to pop up shutdown menu and click Shutdown.
2. The “Shutdown” confirmation window appears. Shutdown
3. Use the arrow keys on the remote control or the front Are you sure to shutdown?
click <OK>.
The system will shut down.
Login
To access a DVR or restricted menu, you should have logged in to the DVR.
1. In live mode, right-click any area of the screen.
2015-01-01 01:10:25
You will see the context sensitive menu as in the right Scene Mode
Spot Out
figure. Audio Off
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Login
The login dialog will also appear if you press a menu button on the x Password
OK Cancel
remote control or the front panel of the DVR when the corresponding
menu requires logging in.
After logged in, press [RETURN] on the remote control to display the
logout dialog.
For the restricted permission, refer to “Permission Management > Setting Permissions”. (Page 43)
M
26_ live
The default administrator ID is “admin”, and the password must be set when the user log in at the first time.
J
Set password for your wireless network if you use the product with a wireless router. Being not protected with password or
using the default wireless router password may expose your video data to potential threat.
To prevent from your personal information being exposed, please change your password every 3 months.
Note that the security and other related issues caused by careless management of password shall be be in the charge of the
user.
• To set your password, please click < > to check your password setup condition.
● LIVE
- If the password has 7 characters or less, the <Check the System Management
password> screen pops up. After checking, please set System Information Settings
your password to one that is 8 characters or longer.
x Storage Device 0 MB (Remained Capacity)
Reset Password
Check
x DVRUSB the38010100
password Export
For security, please set at least 8 characters in combination of alphabet and numbers.
x USBDVR No data Import
If less than 10 digits, it must include special characters.
Please set up
Include the password
Network including alphabets
Settings
and numbers at least 8 characters
Previous
x Power Off No. 1 alarm output used when the power is off. Apply
OK
Previous
All keys are locked. Are you sure to all key lock?
English _27
live
LIVE SCREEN CONFIGURATION
Icons on the Live Screen
You can check the status or operation of the DVR with the icons on the live screen.
b c
2015-01-01 01:10:25
CAM 01
b Login Information When you are logged in, the “LOG ON” icon will be displayed.
Displayed if the recording is in process.
To cancel the recording, right click to select Record Stop from the context menu.
Displayed if the zoom function is activated.
c Screen Mode
Displayed if you press the Pause button.
Displayed in Auto Sequence mode where all channels are switched at the specific time
interval.
Displayed if there is a problem with the cooling fan.
Displayed if the HDD is full and the DVR has an insufficient space to record.
Displayed if no input is entered in the condition that the camera is set to <ON>.
Video Input
Status
Nothing will be displayed on the screen if the camera is set to <OFF>.
28_ live
Part Names Functions
Camera Name/ Channel Displays the camera name and the changed channel, if any.
● LIVE
Operation
Displayed if a motion detected in the condition that the motion detection is set to <ON>.
Appears when the Tampering Detection is set to <ON> and a tampering attempt is
detected.
Displays the current record mode from Record/Event/Schedule.
Error Information
• If the internal HDD is not connected, the “NO HDD”( ) message will appear; if there occurs a problem,
you will see the “HDD FAIL”( ) message in the top left corner. In this case, make sure you contact the
service center for assistance as this may cause a failure of recording, playback or backup.
• If the cooling fan does not work properly or has a problem, the <Fan Information> window will appear and
the fan error icon ( ) will be displayed on the top left corner. In this case, check to see if the internal fan
works.
As a fan error can shorten the product life, make sure you contact the service center for assistance.
If you see the fan error icon or No HDD, HDD FAIL icons on the screen, contact the service center for more details.
M
Live Screen Menu
In addition to the buttons on the front panel or the remote control, you can access a desired menu by right-
clicking the mouse any area in live mode.
Right click opens the context menu which shows different menu items according to the situation, such as
logged in/out state, split screen mode, and various operational conditions.
Menu items of Search, Record, Backup, Shutdown and PTZ can be deactivated, depending on the user permission.
M
Scene Mode
2015-01-01 01:10:25 2015-01-01 01:10:25
Scene Mode
Spot Out Spot Out
Audio Off PTZ Control
Freeze Zoom In
Stop Alarm Audio
Freeze
Record
Stop Alarm
Play
Record
Search
Play
Backup Search
Main Menu Backup
Shutdown Main Menu
Hide Launcher Shutdown
Logout Hide Launcher
Logout
< Split Mode Menu > < Single Mode Menu >
English _29
live
Split Mode Menu
The context sensitive menu in split mode differs, depending on the login/logout status.
c Audio Off
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
m Logout
Menu Functions
Stop Alarm Stops the alarm output and the event monitoring. Refer to “Event Monitoring”. (Page 37)
Play Plays the search result (data). Refer to “Search & Play > Play”. (Page 85)
Backup Refer to “Main Menu > Setting the Backup”. (Page 64)
Main Menu Accesses the main menu. Refer to the Using the DVR section. (Page 38)
Shutdown Turns down the DVR.
Show/Hide Launcher Shows or hides the launcher. Refer to “Show / Hide the Launcher Menu”. (Page 32)
30_ live
Single Mode Menu
The single mode menu is available only in Single Mode.
The menu, which appears as <Screen Mode> on a single screen, appears as <Full Screen> after selecting
only one channel on a split screen.
2015-01-01 01:10:25
Scene Mode
Spot Out
Full Screen
Spot Out
2015-01-01 01:10:25
PTZ Control
b PTZ Control
Zoom In
Audio
c Zoom In
Audio
Freeze Freeze
● LIVE
Stop Alarm Stop Alarm
Record Record
Play Play
Search Search
Backup Backup
Main Menu Main Menu
Shutdown Shutdown
Hide Launcher Hide Launcher
Logout Logout
< Single Mode Menu > < Menu after selecting one channel
on the split screen >
Menu Functions
Select and click a desired channel in Split mode to switch to the full screen of the selected
Full Screen
channel.
b
Accesses the PTZ Control menu.
PTZ Control
The PTZ menu is activated only in One-Channel Live mode. (Page 79)
English _31
live
Show / Hide the Launcher Menu
The Launcher menu appears on the bottom of the live screen.
1. In Live mode, right-click to display the context menu and select <Show Launcher> or <Hide Launcher>.
If selected <Hide Launcher>, the launcher menu disappears on the bottom of the live screen.
2. If <Show Launcher> is selected, the launcher menu appears at the bottom of the screen.
If you click the launcher menu using the mouse, it directly goes into the menu.
2015-01-01
01:10:25
b c
Menu Functions
Displays the current time and date.
Date/Time The indication of AM/PM is displayed if you set 12 hours for the time format in “System >
Date/Time/Language > Time”. (Page 38)
b
Press this button to switch the screen mode in sequence.
Screen Mode
The current mode is highlighted in white.
c Menu Expansion Button Click to display the hidden menu to the right.
Zoom Enlarges the selected area. This is available only in Single Live mode.
Runs the PTZ Control launcher.
PTZ
The PTZ control launcher will be active on the Live screen after you select a single channel.
Play Enters Play mode if a file to play exist, and if not, enters Search mode.
32_ live
LIVE MODE
Display Live images from 16 channels in a total of 8 layout of split screens.
● LIVE
launcher menu items.
CH13 CH14 CH15 CH16 CH7 CH8 CH9 CH3 CH4 CH4 CH5 CH6 CH7
CH6 CH7
CH2
CH10 CH11 CH12 CH13 CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16 CH1 CH1
Auto Sequence
CH1 CH2
CH1
CH1
16 CH1 CH2
CH1
CH1
CH1 CH1
CH3
CH2
CH4 13-16 CH1 CH2 CH3
CH1
CH1
CH1
CH1
CH3 CH4 9-12 CH1 CH4 CH2 CH5 CH3 CH6
In Single mode, If you have set <SEQ-Dwell Time> in “Setting the Device > Camera”, Auto Sequence will be conducted
M at the set interval. (Page 49)
In a split mode, If you have set <Multi CH SEQ Time> in “Setting the Device > Monitor”, Auto Sequence will be
conducted at the set interval. (Page 56)
English _33
live
Manual Switching
Press the left/right button on the front panel or the remote control, or click the arrow <◄/►> key to move to
the next split mode.
• If pressing the right [►] button in 9-split mode :
9-split (CH 1~9) mode 9-split (CH 10~16) mode Auto Sequence
CH4
CH4
CH2
CH5
CH5
CH3
CH6
CH6
CH1 CH2
CH5 CH6
CH9 CH10
CH13 CH14
CH1 CH2
CH1 CH2
CH1 CH2
CH1
CH3
CH2
CH4 13-16
CH3 CH4 9-12
CH3 CH4 5-8
CH3 CH4 1-4
Channel Setting
You can display the channel in a desired area of a split screen.
1. Place the cursor over the camera name of each channel to display the <▼> key to the right on the screen.
2. Click a camera name to display a channel list where you can select a different channel.
3. Select a desired channel and click it.
The current channel will be switched to the selected one.
Use the cursor to select a channel to move, and drag and drop it to a desired channel; this can also
change the channel position.
Ex : if switching CH 1 to CH 7
CH5 CH6 CH7 CH8 CH5 CH6 CH1 CH8
34_ live
Switching to Single Mode
When in split mode, select and double-click a desired channel to switch to its Single mode.
Press the number corresponding to a desired channel on the front panel or the remote control to switch to its
Single mode.
Refer to “Remote Control > Using the numeric buttons”. (Page 14)
Ex : If double-clicking CH 3 or pressing the number “3” on the remote control or the front panel.
● LIVE
CH5 CH6 CH7 CH8
SPOT OUT
The Spot Out monitoring is independent of the Live mode, which monitors a specific channel through the Spot Out port.
Spot Out: It supports auto sequence and single mode by default, and Main Menu
Shutdown
CH9
CH10
CH11
additionally supports 16-split, 9-split and 4-split modes if selected Hide Launcher
Logout CH12
CH13
<Multi Spot> out. CH14
CH15
CH16
English _35
live
ZOOM
This is available only in Single Live mode. In Single mode, select a desired area and use the Zoom function to enlarge
it twice.
1. Select <Zoom In> in the right-click menu.
Press the [ZOOM] button on the front panel or the remote control, or simply click < > in the launcher
menu. The zoom box appears.
2. Use the direction keys, or drag and drop to specify an area to enlarge.
3. Press the [ENTER] button, or double-click the selected area to enlarge it twice.
In the enlarged image, use the direction buttons (
◄ ►) on the remote control or the front panel to move the enlarged
area.
4. Press the [ZOOM] button on the front panel or the remote control to release the zoom.
AUDIO ON/OFF
You can turn the sound on/off corresponding to the channel in Live mode.
Only the channel where <Audio> is set to <ON> in “Device > Camera” displays the audio icon (
M you can use to turn the sound on/off.
) in Live mode that
FREEZE
This is available only in Live mode, this pauses playing the Live image temporarily.
1. Press the [FREEZE] button on the front panel or the remote control, or click < > in the launcher menu.
The playback of the image is stopped temporarily.
Sound continues to play during the pause.
2. Press the [FREEZE] button again, or click < >.
This will release the freeze.
36_ live
EVENT MONITORING
This will display the channel in sync with a specific event (Sensor/Motion/Video Loss/Tampering) if it occurs.
In “Monitor > Event Display”, set the event monitoring to ON/OFF and specify the event display time. (Page 56)
• If multiple events occur simultaneously, the screen will switch to a split mode.
- 2~4 events : 4-split mode
- 5~9 events : 9-split mode
- 10~16 events : 16-split mode
• If the second event occurs within the set time of <Event Display>, the first event will last until the second
● LIVE
one is terminated. (Page 56)
Ex : If you set <Event Display> to 5 seconds, and only one event occurs in CH 1.
Event occurrence 5 seconds
Stop alarm
CH1
Ex : If you set <Event Display> to 5 seconds, and the second event occurs in CH 2 within the set time after the first
event occurred in CH 1.
Stop alarm
CH1 CH2
CH1
Press the [ALARM] button to reset the alarm settings and to release the event mode.
M
If an alarm activates in the condition you have set the event record, and pre/post alarm times, the event record will be
performed.
This will also apply to the Spot Out monitor.
In case of continuous events such as motion detection, switching to another split mode display may not immediate if
J concatenating events follow, even when you stopped alarm of the event.
English _37
main menu
You can setup the system properties, devices, and options for recording, event, backup
and network.
SYSTEM SETUP
You can setup Date/Time/Language, Permission, System Properties and Log.
Date/Time/Language
You can check and setup the current Date/Time and time related properties, as well as the language used for
the interface on the screen.
• Date : Sets the date that will appear on the screen. Date/Time/Language
You can select the date format. Date/Time/Language Holiday
• Time : Sets the time and its format that will appear on the x Date 2015-01-01 YYYY-MM-DD
screen.
x Time 08:14:24 24 Hours
Select either one from <24 Hours, 12 Hours (AM/PM)>. x Time Zone GMT
x Time Sync. Setup
• Time Zone : Sets the time zone of your area based on the x DST Dec First (Sun) 0 Dec First (Sun) 0
- Activate as Server : Set to <Use> to allow the DVR to act x Synchronization Use
x Time 08:14:24 24 Hours
as a Time Server for other DVRs. x Time Server
x Time Zone GMT+08:00
203.248.240.140
x Last Sync Time Fail
• DST : Set up Daylight Saving Time with its period to make x Time Sync.
x DST
Setup
x Activate as Server
Not Used
Use
Dec First (Sun) 0H Dec First (Sun) 0H
the time earlier than the GMT of its time zone by 1 hour OK Cancel
• Language : Select your language. Sets the language for the OK Cancel
interface.
● MAIN MENU
English, French, German, Spanish, Italian, Chinese(Simplified),
Russian, Korean, Polish, Japanese, Dutch, Portuguese, Turkish, Czech, Danish, Swedish, Thai, Romanian,
Serbian, Croatian, Hungarian, Greek, Chinese (Traditional), Finnish and Norwegian are available.
6. When the Date/Time/Language setup is done, press <OK>.
You can also use numeric buttons on the remote control or front panel to enter values for Date, Time and other numeric
M fields.
Setting Holiday
You can set specific dates to Holidays according to your preferences.
Holidays are applied to <Recording Schedule> and <Alarm Schedule> too.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Date/Time/Language> window to select <Date/Time/Language>, and
press the [ENTER] button.
2. Select <Holiday>. Date/Time/Language
A calendar for Holiday setup appears. Date/Time/Language Holiday
3. Use the left/right < > buttons to select year or month, 2015 Jan
and press the [ENTER] button. Sun Mon Tue Wed Thu Fri Sat
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
OK Cancel
Ex : Select January 12th and check on <1/12> only to make every Setting
Sun Holiday
Mon Tue Wed Thu Fri Sat
1 2 3
January 12th a holiday. Check both on <1/12> and <Jan 2nd 4 5
1 / 12
6 7 8 9 10
Jan 2nd Mon
Mon> to make every January 12th and 2nd Monday of January 11 12 13 14 15 16 17
18 19 OK
20 21 Cancel
22 23 24
holidays. 25 26 27 28 29 30 31
English _39
main menu
Permission Management
You can set permissions of each user over the DVR's specific function and settings.
x Confirm P/W
************
************
z x c v b n m , . / Shift
In the upper text input box of the virtual keyboard, there Space Ctrl
displays a list of candidate words containing the selected OK Cancel
character.
Select a word from the list, or use the keyboard to enter the whole word.
If there are many of candidate words, use < , > buttons to move between them forward and backward.
Select <OK>.
Entered word is applied.
For upper case letters, use <Caps Lock> button.
For special characters, use <Shift> button.
Using the virtual keyboard is the same to a normal keyboard use in your region.
You can enter the ID with case-insensitive alphanumeric characters only.
For the password, use alphabets and special characters excluding < \ > and <">.
You can use number buttons on the remote control or front panel.
● MAIN MENU
A window for <Add>, <Delete>, <Rename>, and Search
Backup
Setup
Setup
displayed in the Live menu when a group user logs in. x Group ABC Add Delete Rename
x Group Authority
• Live View : You can set the permission to access the Live Channel
Live View
Setup
Setup
All
screen according to the channel. Search
1
Setup
2 3 4
Backup Setup
5 6 7 8
• Search : You can set the permission to access the Search Menu 9 Setup 10 11 12
Bi-directional13
audio 14 15 16
menu according to the channel. Record Lock PTZ
OK
Remote Alarm Out
Cancel
Shutdown
x System
Group Device
ABC Record Event
Add Backup
Delete Network
Rename
• Bi-directional audio: You will be given permission to use Group Authority
Date/Time/Language
two-way audio features. Live View Setup
Date/Time/Language
Search Setup
Holiday
System Management
• Record Lock, PTZ, Remote Alarm Out, Shutdown : Select Backup
Menu
Setup
System Information
Setup
an item so that the item will be added to the permissions. Log Information
Record Lock
System Log
PTZ Remote Alarm Out
Event Log Backup Log
Shutdown
2. Select <OK>.
Select and assign a group user so that the user can OK
OK Cancel
Cancel
English _41
main menu
To restrict the user permissions
If the admin restricts all permissions of an added group, the users belonging to that group can access only
the default minimum menus and can change the user’s own password only.
1. Start the DVR.
If all permissions are restricted, only the Login dialog
should appear.
2. Log in with a registered user ID. Login
x ID abc
x Password
OK Cancel
● MAIN MENU
A window for Add User appears.
3. Use direction buttons (
◄ ►) to select <Add> from the
window.
Previous/Next Page
A window for “Add User” appears.
OK Cancel
OK Cancel
For more information about use of Network Viewer, refer to the Previous/Next Page
Setting Permissions
You can set restricted access for all general users.
Items with restrictions will require logging in for use.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <System> window to Permission Management
move to <Permission Management>, and press Admin Group User Setup
[ENTER] button. x Restricted Access
Live View Backup Record Lock Search
Auto Log out, Manual Input of ID setup screen appear. All Network Web Viewer
• Restricted Access : All menu items allowed for a user can OK Cancel
English _43
main menu
• Manual Input of ID : Prompts you to enter the user ID
manually for the login process.
- Checked ( ) : Encloses the registered user IDs with the
[] symbols. Login
Use the virtual keyboard to enter the user ID. x ID *****
x Password
• Touch Button Sound : You can set whether to sound beep OK Cancel
System Management
You can check the system version, update to a newer version, as well as data backup and initialization.
2. Check the Software Version, Broadcast Format and MAC x Broadcast Format NTSC
● MAIN MENU
4. Press <Search> button to display updated image, then the <Search> button switches to <Upgrade>.
The <Upgrade> button will be activated only if the current <Software Version> of the <System Information> is same to
or older than that of <S/W Upgrade>.
x MAC Address
Current Version 00:00:F0:54:FF:FF
vx.xxh_yymmddhhmmss
New Version vx.xxh_yymmddhhmmss
x S/W Upgrade Do you want to upgrade?
x Device Network Search
OK Cancel
x Version No S/W Data
Previous
System Management
System Information Settings
x System Information
x Software Version vx.xxh_yymmddhhmmss
x BroadcastS/W
Format
Upgrade
NTSC
Previous
English _45
main menu
Settings
You can copy and import the DVR settings by using a storage media.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <System> window to System Management
move to <System Management>, and press [ENTER] System Information Settings
button.
x Storage Device 0 MB (Remained Capacity)
x DVRUSB 38010100 Export
2. Select <Settings>. x USBDVR No data Import
A window of storage device and load factory default Include Network Settings
checking the checkbox, if you push the <Apply> button, all x Load Factory Default OK
Default Cancel
event alarms that were set by Alarm 1 output will be x Power Off No. 1 alarm output used when the power is off. Apply
System Log
System Log shows log and timestamp on every system start up, system shutdown, and changes on system
settings.
Using the mouse may help make setup easier.
● MAIN MENU
1. Use the up/down buttons (
) in <System> window to
Log Information
move to <Log Information>, and press [ENTER] button. System Log Event Log Backup Log
First Page
2015-01-01
Last Page
Search
Refer to “Using the Calendar”. (Page 39) No. Log List Date/Time
• Export : All logs recorded in the DVR are exported to the Export Previous
storage media.
3. Use direction buttons (
◄ ►) to move to a desired item, and press <Search>.
Event Log
Event log shows recorded events on alarms, motion detections and video loss.
It also shows the log and its timestamp.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <System> window to
Log Information
move to <Log Information>, and press [ENTER] button. System Log Event Log Backup Log
First Page
2015-01-01
Last Page CH
Search
Backup Log
You can find out who backed up and the details (backup time, channel, device to use, file format, etc.).
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <System> window to
Log Information
move to <Log Information>, and press [ENTER] button. System Log Event Log Backup Log
Search Day 2015-01-01 ~ 2015-01-02 Search
2. Select <Backup Log>. First Page Last Page Previous/Next Page
English _47
main menu
SETTING THE DEVICE
You can setup Camera, Storage Device, Remote Device, POS Device and Monitor.
Camera
4. Select <Camera>.
Camera
Displays settings window for Video, Audio, CH Name, Camera PTZ
SEQ-Dwell Time, Progressive, Screen Setup and Privacy CH Video Audio CH Name SEQ-Dwell Time Type
Region. 1
2
ON
ON
OFF
OFF
CAM 01
CAM 02
5 sec
5 sec
SD
HD
3 ON OFF CAM 03 5 sec HD
If the channel is set to <Covert1> or <Covert2> mode, the channel’s sound is not hearable.
M However, the channel’s sound is recorded if its Audio setting is set to <ON>, even the sound is not heard in Live mode.
• Audio
- If set to <ON>, you can turn the audio of the channel ON/OFF on the Live screen.
- If set to <OFF>, the channel’s audio is off on the Live screen and not recorded.
Audio output is available for only 1 channel.
• CH Name : Up to 15 characters including blanks are allowed.
Refer to “Using Virtual Keyboard”. (Page 40)
The first character should not be empty.
If you use a progressive camera, you can set it to <On> to eliminate screen shaking.
J
• Screen Setup : The video appeared on the screen may vary
depending on the channel’s camera, configure the DVR
display to your preferences.
● MAIN MENU
Select a channel and adjust the < (Brightness)>,
< (Contrast)>, and < (Color)> of the selected channel.
Press the <Init> to initialize settings back to the default.
• Privacy Region : You can specify a certain area of the Screen Setup
CH1 53 53 50 Init Apply to All CH
camera video to be protected for your privacy.
OK Cancel
Privacy Region1
OK Cancel
You can specify up to 4 privacy zones for each channel,
which can be identified by the color.
1 Purple 2 Green 3 Blue 4 Yellow
• To set the area using <Individual> selection
In the “Privacy Region” window, you can select cells individually by using <Individual>.
When selected <Individual>, “Privacy Region” window disappears and you can select cells one by one.
When the motion area setup is done, Right-click to select <Menu> in the context menu or the [MENU]
button on the remote control to display the “Privacy Region” window again.
- Clear All : Selected cell is removed from the Privacy Region. Clear All
- Menu : After selecting individual motion areas, move to the “Privacy Region” window.
Menu
If selected <Apply to All CH>, selected motion area is applied to all channels.
When completing the privacy zone settings, click <OK>.
English _49
main menu
Setting the PTZ
To use Camera’s PTZ functions, ID and protocols of each camera and DVR should be matched.
For other settings, refer to the <Remote Device> settings. (Page 54)
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Device> window to
Camera
move to <Camera>, and press [ENTER] button. Camera PTZ
2. Select <PTZ>. CH
1
Port
RS-485
ID
0 >
Protocol
None
• Port : Select a port control method for the camera that is * Coaxial Auto : HD : ACP, SD : PELCO-C Previous/Next Page
connected to a channel.
OK Cancel
You can check the camera’s ID and protocol if you turn the camera off and on after connecting it to the DVR.
M
When camera is connected through coaxial port, DVR would recognize HD or SD camera automatically and apply proper
protocol.
For HD camera, ACP protocol is applied.
For SD camera, PELCO-C protocol is applied.
Confirming Devices
You can check storage devices and their free space, usage as well as status.
Devices available are HDD, and USB devices (Memory, HDD).
Using the mouse may help make setup easier.
● MAIN MENU
1. Use the up/down buttons (
) in <Device> window to
Storage Device
move to <Storage Device>, and press [ENTER] button. Device Format HDD Alarm
OK
OK
English _51
main menu
Formatting
You can format a storage device.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Device> window to
Storage Device
move to <Storage Device>, and press [ENTER] button. Device Format HDD Alarm
OK Cancel
OK Cancel
Format
OK Cancel
● MAIN MENU
and their durations appears.
x Replace Alarm Output Port 1 2 3
4 BEEP All
3. Use direction buttons (
◄ ►) to move to the desired x Duration OFF
item.
• Alarm
OK Cancel
- Alarm signal will output through the alarm out port on the
rear side when selected <1>, <2>, <3>, and <4>.
- If <BEEP> was selected, a beep will sound.
- If <All> was selected, both beep sound and alarm signal through rear side ports will output.
• Check Alarm Output Port : If HDD generates check alarm, the alarm signal will output to the specified alarm
output port.
• Replace Alarm Output Port : If HDD generates replace alarm, the alarm signal will output to the specified
alarm output port.
• Duration : Sets the alarm duration for the alarm signal and beep sound.
- Check Alarm, Replace Alarm signals will output through the selected alarm out ports (1, 2, 3, and 4).
- If <BEEP> was selected, a beep will sound.
- If <All> was selected, both beep sound and alarm signal through rear side ports will output.
<Check> status means that the HDD is operating but it has problems that require technical examination.
M ( ) appears on the Live screen.
<Replace> status means that the HDD has defect and requires immediate replacement.
( ) appears on the Live screen.
If the installed HDD is not recognized properly, a confirmation popup will appear.
4. When the HDD Alarm setup is done, press <OK>.
English _53
main menu
Remote Devices
You can set the RS-485 communication for use of PTZ Camera and system keyboard with the DVR.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Device> window to
Remote Device
move to <Remote Device>, and press [ENTER] button.
Baudrate Parity Data Stop Bit Transfer type
Remote Control ON ID 0
3. Set the values of each communication setup of the remote
device.
• Baudrate : Baud rate settings of the DVR, PTZ camera and
system keyboard should be matched for proper operations.
OK Cancel
For changing the remote control’s ID, refer to “Changing the Remote Control ID”. (Page 14)
M
POS Devices
You can set properties of POS devices connected to the DVR.
A POS device connection requires channel, preset, and Port/Ethernet settings.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Device> window to
POS Device
move to <POS Device>, and press [ENTER] button. POS USE
POS Device Setup
• POS USE : When selected <POS USE>, DVR and POS will 4
5
None
None
No preset
No preset
None
None
be connected. 6
7
None
None
No preset
No preset
None
None
8 None No preset None
Previous/Next Page
If you change settings for the device and press <OK> while the
J <POS USE> is not checked, the changes for POS device will not OK Cancel
be saved.
POS function is not available on HD (1080p/720p) cameras, please connect DVR with SD camera only.
M
OK Cancel
● MAIN MENU
• CH : Select the camera to be synchronized to the POS POS Device
device. POS USE
POS Device Setup
If selected a channel input field, “Sync Channel Setup” window POS CH Preset Port/Ethernet
1 None No preset None
appears. 2 SyncNone
Channel SetupNo preset None
3 None No preset None
Use <Add> button to display “Add Preset” window, and set its 2
3
None
x Name
None
No preset
No preset
None
None
4 None
x Start Keyword No preset None
name, start string, and end string. 5 None
x End Keyword No preset None
6 None No preset None
7 None OKNo preset Cancel None
• Port/Ethernet : Sets the port number for the DVR and POS 8 None No preset None
English _55
main menu
Monitor
You can configure information to be displayed and its format for Spot Out monitor.
x VGA/HDMI 1280X1024
and set the value. x HDMI Resolution Auto Detection ON
Screen Setup
Some monitors many not display information (camera name, icon, time information, etc.) about the DVR,
depending on the condition. Then, you can change the display position of the data.
1. In the <Device> window, press the up/down (
) button to move to <Monitor> and press the [ENTER]
button.
2. Select the <Monitor> item.
3. Select <Display Position Setup> in the bottom. 2015-01-01 01:10:25
You will move to the <Display Position Setup> window.
4. Use the four direction buttons or the number buttons on Display Position Setup
the front panel or the remote control to adjust the data 30
position. 30 30
30
OK Cancel
● MAIN MENU
3. Use direction buttons (
◄ ►) to move to a desired item, x Event Display OFF
OK Cancel
(Page 49)
• Event Display : Sets the duration for the Spot Out on an OK Cancel
event.
If selected <OFF>, an event will not output to the Spot Out.
You can setup using the mouse right button in Live screen.
M Refer to “Spot Out”. (Page 35)
If selected <Multi Spot> double frame function is deactivated.
4. When the Spot Out is done, press <OK>.
English _57
main menu
SETTING THE RECORDING
You can setup scheduled recording, event recording and other recording related settings.
Recording Schedule
Make your reservation on a date and time to schedule the recording on specified time.
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control or front
panel. Logout Return
• Recording type : Select each time cell, and then select a No Recording Continuous Apply to All CH
Event Both(Cont&Evnt)
type to start recording.
OK Cancel
Sun
Mon Apply to All CH
6. When the recording schedule setup is done, press <OK>. Tue
Wed
Apply recording schedule to all channels?
Thu
No Recording Continuous
OK Cancel
Apply to All CH
Event Both(Cont&Evnt)
OK Cancel
● MAIN MENU
Each press of a selected cell will cycle through <No Recording>-<Continuous>-<Event>-
<Both(Cont&Evnt)>.
pre-determined time prior to the actual occurrence of the event. Previous/Next Page
[ENTER] button.
CH Resolution Record Rate Record Quality Type
1 CIF 7fps Level4 SD
2. Select <Standard>. 2 CIF 7fps Level4 SD
3 CIF 7fps Level4 SD
OK Cancel
English _59
main menu
Setting Event Recording Properties
You can set each channel’s resolution, quality and FPS for event recordings.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Record> window to REC Quality & Resolution
move to <REC Quality & Resolution>, and press Standard Event
[ENTER] button.
CH Resolution Record Rate Record Quality Type
1 4CIF 7fps Level4 SD
2. Select <Event>. 2 4CIF 7fps Level4 SD
3 4CIF 7fps Level4 SD
Event recording setup window appears. 4 4CIF 7fps Level4 SD
5 4CIF 7fps Level4 SD
Record Option
You can set the recording to stop or overwrite when the HDD is full.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Record> window to Record Option
move to <Record Option>, and press [ENTER] button.
x Disk End Mode Overwrite
2. Use direction buttons (
◄ ►) to move to a desired item, Disk End Beep
Auto
DeleteDelete 180
and set the value. x Auto day
Sensor Detection
You can set the sensor’s operating condition and connected camera, as well as alarm output and its duration.
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control or front
● MAIN MENU
Logout Return
panel.
2. Use the left/right button (◄ ►) to select <Event>.
Event setting menu is selected. Event
Sensor Detection
Motion Detection
Video Loss Detection
Tampering Detection
Alarm Schedule
Previous/Next Page
- <OFF> : Sensor does not operate.
- <N.O> : Sensor is opened. OK Cancel
If the sensor is closed, it generates alarm.
- <N.C> : Sensor is closed.
If the sensor is open by interruption, it generates alarm.
• Cam : Select a channel to be connected to the sensor.
Sensor Detection
If selected camera, “Cam Preset setup” window appears. Cam Preset setup
Sensor Sensor Operation Cam Alarm Duration
Select a channel and setup the preset. 1
CH
OFF
Preset
1 None
CH
10 sec
Preset
OK Cancel
OK Cancel
OK Cancel
English _61
main menu
Motion Detection
You can set target detection region and motion, as well as the alarm signal output.
When the motion detection region is set, it detects motion within the area.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Event> window to Motion Detection
move to <Motion Detection>, and press [ENTER] button.
CH Mode Sensitivity Alarm Alarm Duration
A window of motion detection area setup appears. 1 OFF Level10 (High) None 10 sec
2 OFF Level10 (High) None 10 sec
Previous/Next Page
• Sensitivity : Sets the sensitivity level of the motion detection. Motion Region
● MAIN MENU
6 OFF None 10 sec
and set the value. 7 OFF None 10 sec
8 OFF None 10 sec
• Video Loss State : Sets whether to activate video loss Previous/Next Page
detection.
• Alarm : Sets the alarm output method. OK Cancel
Tampering Detection
You can set to detect tampering attempts and trigger events, such as sudden change of camera’s framing
direction, blocked lens and other overall change of scenes from the video.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Event> window to
Tampering Detection
move to <Tampering Detection>, and press [ENTER]
CH Mode Sensitivity Alarm Alarm Duration
button. 1 OFF Medium None 10 sec
Since the tampering detection is designed and optimized to function in accordance with the user defined sensitivity level, it
M may not render a significant difference in detection with varied sensitivity in general monitoring situations.
When the tampering detection mode is set <ON>, it is recommended that the pre event recording time of the corresponding
channel should be set to 10 seconds or longer.
English _63
main menu
Alarm Schedule
You can set the conditions and operating hours for scheduled alarms.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Event> window to
Alarm Schedule
move to <Alarm Schedule>, and press [ENTER] button.
Alarm1
All 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
2. Use direction buttons (
◄►) to move to a desired item, Sun
For further information on alarm output, refer to “HDD Alarm > Sat
Hol
scheduled time.
• OFF : Marked in white, no alarm is generated even if an event occurs.
• Event Sync : Marked in Blue, generates alarm only when an event occurs.
• Apply to All Alarm : Applies the configured schedule to all Alarm Schedule
alarms. Alarm1
All 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
When the alarm is generated on the scheduled time, you can Sun
OK Cancel
BACKUP
You can check the backup device and set the backup schedule by channel or by time.
The product only supports external HDD of USB memory. (Page 120)
Backup
● MAIN MENU
You can select multiple channels.
• Device : Select a backup device from the recognized devices.
• Type : Sets the backup data format.
- DVR : Saved data can be played back only by the DVR.
- AVI : Saves the CODEC information provided by the DVR with the recording data, and saved data can be
played back by using external viewers (such as Windows Media Player) on a PC.
If you need to install a codec in Windows, run the x264_dvr.exe file in the codec folder that is created when you back up an
AVI file.
- SEC : Saves data in the Samsung’s proprietary format with built-in viewer, which supports immediate
playback on a PC.
• File Name : You can set the back file name.
Refer to “Using Virtual Keyboard”. (Page 40)
• Check capacity : Shows the size of the selected backup data, used and available capacity of the selected
backup device.
• Overlap : Shows a list of overlapping data on a same time according to the number of data.
It appears when one channel has multiple data on a certain time point due to changing of time or time zone
settings, etc.
Refer to time and time zone of “Setting the Date/Time/Language”. (Page 38)
5. When the backup setup is done, press <OK>.
If no available device is recognized for backup, <OK> button is not activated.
Pressing the <Exit> during the backup will return to the previous menu, while the backup progresses.
M
English _65
main menu
NETWORK CONFIGURATION
It provides networked monitoring of Live screen from a remote place, and supports mail forwarding function with
events. You can configure the network environment which enables such functions.
Connection Mode
You can set the network connection route and protocol.
4. Select <Interface>.
Connection Mode
A window of connection mode setup appears. Interface Port Alarm
- For <PPPoE> : IP Address, Gateway, and Subnet Mask x DNS Manual 168.126.63.1
● MAIN MENU
DNS server for <DHCP> and <PPPoE> can be set by user only if you selected <Manual>.
M
6. When the connection setup is done, press <OK>.
button.
x Protocol Type TCP
x Device Port 4520 ~ 4524
2. Select <Port>. x UDP Port 8000 ~ 8160
x Unicast/Multicast UDP-Unicast
English _67
main menu
Alarm setting
1. In the <Network> setting window, press the top down
Connection Mode
(▲▼) button to move to the <Connection Mode> mode Interface Port Alarm
and press the [ENTER] button. 1 2 3
x Disconnect Alarm Output Port
4 BEEP All
2. Select the <Alarm> menu. x Duration OFF
• Network Overview
Router (External IP: 109.112.92.133, Cable/ADSL
Local IP: 192.168.1.1 Modem
Internet
● MAIN MENU
DDNS Server
(www.samsungipolis.com)
USB USB
DVR 1 DVR 2
Local PC
DVR 1 DVR 2
System
WEB RTSP WEB RTSP
IP 192.168.1.200 192.168.1.200 192.168.1.202 192.168.1.202
Protocol TCP TCP TCP TCP
Private Port 80 4520~4524 81 4525~4529
Public Port 80 4520~4524 81 4525~4529
OK Cancel OK Cancel
OK Cancel OK Cancel
English _69
main menu
• 1st Set Port Forwarding Setting
Port Forwarding is 4520~4524
(4520, 4521, 4522, 4523, 4524) Port Forwarding is 80
SRD-1694 SRD-1694
192. 168. 1. 200 192. 168. 1. 200
TCP TCP
4520 80
4520 80
SRD-1694 SRD-1694
192. 168. 1. 202 192. 168. 1. 202
TCP TCP
4525 81
4525 81
● MAIN MENU
- DVR Network Settings : Set the <Connection Mode> in Connection Mode
<Interface> menu of the connected DVR to <Static>. Interface Port Alarm
Consult your network manager for IP Address, Gateway and x IP Type Static
x IP Address 192.168.1.200
• PPPoE mode
- Internet connection : An PPPoE modem is directly connected to the DVR, where the PPPoE connection
requires user ID and password.
- DVR Network Settings : Set the <Connection Mode> in Connection Mode
<Interface> menu of the connected DVR to <PPPoE>. Interface Port Alarm
<ID> and <Password> should be the same to the PPPoE user x IP Type PPPoE
x Transfer Bandwidth 600kbps
information.
x IP Address 192.168.1.200
If you don’t know the ID and password, consult your PPPoE service x Gateway 192.168.1.1
x ID ID
x Password ************
OK Cancel
English _71
main menu
When a router is used
To avoid IP address conflict with the DVR's static IP, check followings :
J
• Setting the DVR with a static IP
- Internet connection : You can connect the DVR to a router which is connected to an ADSL/Cable modem
or a router in a Local Area Network (LAN) environment.
If a DHCP server is configured with starting address (192.168.0.100) and end address (192.168.0.200), you should set
J the IP address out of the configured DHCP range (192.168.0.2 ~ 192.168.0.99 and 192.168.0.201 ~ 192.168.0.254).
3. Check the Gateway address and subnet mask are equal to those set in the Broadband Router.
Above steps may differ from the router devices depending on the manufacturer.
M
● MAIN MENU
OK Cancel
Above steps may differ from the router devices depending on the manufacturer.
M Port forwarding is required when you want to access the DVR connected to the router from outside of the router’s network.
DDNS
You can set the DDNS site for a remote user’s network connection.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to
DDNS
move to <DDNS>, and press [ENTER] button.
DDNS Setup screen appears. x DDNS Site iPOLiS
x Server Name www.samsungipolis.com
x Product ID
2. Use the virtual keyboard to enter the <Product ID>. x Quick Connect Not Used Use
Refer to “Using Virtual Keyboard”. (Page 40) x DDNS Host Address http://www.samsungipolis.com/
If the quick connect setup has been cancelled while progressing, it is automatically set to <Not Used>.
M
3. When the DDNS setup is done, press <OK>.
English _73
main menu
DDNS Setting
DDNS is a short form of Dynamic Domain Naming System.
DNS (Domain Name System) is a service that routes a domain name consisting of user friendly characters
(ex : www.google.com) to an IP address consisting of numbers (64.233.189.104).
DDNS (Dynamic DNS) is a service that registers a domain name and the floating IP address with the DDNS
server so that the domain name can be routed to the IP address even if the IP is changed in a dynamic IP
system.
Go to Your PC
1. Open your browser and go to http://www.samsungipolis.com and click <LOGIN>.
2. You first need to create an account.
Click <SIGN UP>.
3. Follow the account registration instructions on the website.
4. After completing the account registration, login to your
account.
SRD-1694
srd1694home SRD-1694
● MAIN MENU
Go back to DVR
1. From network tab, click on <DDNS>.
Logout Return
Network
Connection Mode
DDNS
Live Transfer
Mailing Service
SNMP
OK Cancel
3. Under Product ID, enter the product ID you created on the DDNS
Samsung iPOLiS website.
Under Quick Connect, select <Use> and click <OK>. x DDNS Site
x Server Name
iPOLiS
www.samsungipolis.com
x Product ID srd1694home
x Quick Connect Not Used Use
OK Cancel
For more information on enabling UPNP on your router, please x DDNS Site
x Server Name
iPOLiS
www.samsungipolis.com
see Router manual. Connectionsrd1673dhome
x Product ID
x Quick Connect Not Used Use
OK
OK Cancel
English _75
main menu
Live Transfer
Sets the quality of the image that is transferred from the DVR to the network.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to
Live Transfer
move to <Live Transfer>, and press [ENTER] button.
CH Resolution Quality
The Live Transfer window appears. 1 CIF Low
2 CIF Low
Mailing Service
You can send an e-mail to a DVR-registered user at a specific time interval, or if an event occurs.
If an event occurs with a channel where the camera’s video is set to <OFF> or the remaining recording count is set to
M <OFF>, only the text notification will be sent to the applicable email address.
If you set the interval of the e-mail notice too short, the e-mail server may consider it as spam that will not be transferred
J normally.
SMTP Setting
Sets the SMTP mail server.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to
Mailing Service
move to <Mailing Service>, and press [ENTER] button. SMTP Event Group Recipient
Use Authentication
3. Use direction buttons (
◄ ►) to move to a desired item, ID
Password
and set the value.
x Secure Transfer Never
• ServerType : Displays the connected server type. x Sender Address ex. [email protected]
E-mail Test
Event Setting
● MAIN MENU
You can set the interval and type of the event that will be sent to the user.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to
Mailing Service
move to <Mailing Service>, and press [ENTER] button. SMTP Event Group Recipient
and set the value. Change P/W HDD Info Video Loss
Power On/Off Manual Record
• Event Interval : Set the event interval.
If a series of events occurs, the e-mail will be sent at the specified
interval, not on each event. OK Cancel
Group Setting
You can set the group to whom the e-mail is sent, and specify the permission for each group.
You can add recipients for each group in the <Recipient> menu item.
The recipient is set separately from the DVR user group.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to
Mailing Service
move to <Mailing Service>, and press [ENTER] button. SMTP Event Group Recipient
English _77
main menu
Recipient Setting
You can add/remove a recipient(s) to/from the specified group and edit the group if necessary.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to Mailing Service
move to <Mailing Service>, and press [ENTER] button. SMTP Event Group Recipient
Previous/Next Page
OK Cancel
x Name
For inputting the recipient name and email address, refer to x Email
OK Cancel
SNMP
You can configure the settings for the SNMP protocol.
Using the mouse may help make setup easier.
1. Use the up/down buttons (
) in <Network> window to SNMP
move to <SNMP>, and press [ENTER] button.
The SNMP setup screen appears. x
x
Enable SNMP v1
Enable SNMP v2
Read Community public
2. Use direction buttons (
◄ ►) to move to a desired item, Write Community write
PTZ Device
The PTZ device can be activated only if a channel in connection with the PTZ camera is selected.
● MAIN MENU
The PTZ camera is available, only if a channel is selected, in the following way :
Using the remote control buttons
2015-01-01 01:10:25
Scene Mode
Press the [PTZ] button on the remote control. Spot Out
PTZ Control
English _79
main menu
Using the PTZ camera
You can use one camera to perform all functions of PAN, TILT and ZOOM for monitoring multiple places and
set the preset to your preference in a desired mode.
1. Launch the <PTZ Control> menu.
2015-01-01 01:10:25
As the < > icon on the bottom right corner turns
yellow, you access the “PTZ Control” mode to display the
“PTZ Control” menu.
Be sure to configure PTZ working environments before operation,
M since the PTZ Working(Active) mark can be appeared to be PTZ Control CAM01
Swing Select Camera Setup
activated even when PTZ is not operative. Group Select Select Preset
Trace Select
Save Rename
Preset Select
Tour Delete Delete All
2. Use the PTZ wheel in the launcher menu to adjust the
Exit
monitoring area, or use the direction buttons (
◄ ►) on
the remote control to move the camera to a desired place.
• PTZ Wheel : Clicking a nearer point to the center will move in that direction slowly; clicking a farther point
from the center will move fast.
Keep clicking left to rotate the lens counter clockwise; keep clicking right to rotate the lens clockwise.
• Zoom ( ) : You can use the Zoom function of the PTZ camera.
• IRIS ( ) : Adjusts the intensity of radiation incoming to the iris.
• Focus ( ) : Enables you to adjust the focus manually.
• Swing : Moves between the preset start point and end point.
• Group : Moves in the path specified by combining the preset, pattern and auto pan.
• Trace : Moves camera’s framing in the predefined path.
• Preset : Sets the preset position for camera framing and moves to designated preset position when
selecting a desired preset.
• Tour : Moves in the path specified by combining multiple groups.
For the coaxial communications, the operation may differ depending on the protocol.
Before entering the PTZ device control mode, set the values of the PTZ device in the <Setting the PTZ> menu.
M (Page 50)
For camera specifications that supports PTZ comtrol depending on communication method, refer to our web site.
● MAIN MENU
• Save : You can add and save the preset.
• Rename : You can change the settings of the existing presets.
• Delete : Deletes the selected preset.
• Delete All : Deletes all existing presets.
If you replace the camera of the channel that stores the preset list with a new one, you should reset the preset accordingly.
M
3. Press <OK>.
The preset will be saved as a name that you entered.
Camera Setting
A PTZ camera has its own menu system. Optimize the PTZ camera according to the DVR.
Using the mouse may help make setup easier.
• Select <Camera Setup> in the PTZ Control menu.
2015-01-01 01:10:25
The camera-specific menu appears.
You can configure the settings of those cameras that support the
protocols of Samsung-E/Samsung-T/Pelco-D/Pelco-p/Panasonic/
Phillips/AD/DIAMOND/ERNA/KALATEL/VCL TP/VICON/ELMO/GE.
Camera Setup
If you are setting Auto Pan or Pattern in the camera menu, press
and hold the appropriate button for a certain time so that the
English _81
search & play
SEARCH
You can perform the search for recorded data by the time or by the search criteria such as an event.
You can access the <Search> menu directly in Live mode.
1. In Live mode, right-click any area of the screen. 2015-01-01 01:10:25
The Live menu appears. Scene Mode
Spot Out
Audio Off
2. Select <Search>. Freeze
Stop Alarm
Or, press the [SEARCH] button on the remote control or Record
Play
the front panel. Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
If you have not checked <POS USE> in the “Main Menu > Device
> POS Device” menu, the Search menu does not include the <POS
Return
Search> item. (Page 54) Time Search
Event Search
4. The search can be restricted by the Auto Delete function. Backup Search
POS Search
Refer to “Setting the Recording > Record Option”. Motion Search
(Page 60)
Time Search
You can search for recorded data of a desired time.
As the time to display may be different depending on the time zone and the DST standard time, the time of
data recorded in the same time can be displayed differently depending on time zone and DST settings.
Using the mouse may help make setup easier.
1. Select <Time Search> in the <Search> menu.
Time Search
2. Select a date to search. 2015-01-01 Go to First Go to Last
• Zoom Out : The map will switch in the reverse order of the All Data
CAM 01
detailed mode above. CAM 02
CAM 03
It will switch in the sequence of 4 hours - 8 hours - 16 hours 2015/01/01 00:01:17 CAM 04
CAM 05
- 24 hours. Standard
Motion
Schedule
Sensor
CAM 06
CAM 07
V.Loss Etc
Tampering Previous/Next Page
Event Search
You can search for events by the channel and play them.
Using the mouse may help make setup easier.
1. Select <Event Search> in the <Search> menu.
Event Search
2. Use direction buttons (
◄ ►) to set the search criteria CAM 01
2015-01-01 View all
and press the [ENTER] button. Overlapped Data List1 Go to First Go to Last
recording included) 2
1
00:39:06 ~ 00:40:30
00:01:22 ~ 00:02:28
Motion
Motion
• Date/Time Preview : If you select a data item in the list, the 2015/01/01 00:01:22
Backup Search
Searches for backup data in the connected backup device.
Only data in the format of DVR is included in the search.
Refer to <Type> in “Backup > Setting the Backup”. (Page 64)
Using the mouse may help make setup easier.
1. Select <Backup Search> in the <Search> menu. Backup Search
2. Use direction buttons (
◄ ►) to set the search criteria No. Folder
USB:USB2FlashStorage
File Name
and press the [ENTER] button. 1 20150101 16190000
English _83
search & play
POS Search
You can search for data in the POS device that is connected to the DVR.
You can use the mouse to select the related items.
1. Select <POS Search> in the <Search> menu.
POS Search
2. Use direction buttons (
◄ ►) to set the search criteria Date/Time 2015-01-01 02:41:18 2015-01-01 03:41:18 Search
• Keyword : Use the virtual keyboard to enter a keyword. 1 1 2015-01-01 03:41:10 CASH _
2015/01/01 03:41:15
• Search Criteria : CHANGE
5.95
Motion Search
If a motion is detected in each channel, you can set a desired area to perform the search.
You can use the mouse to select the related items.
1. Select <Motion Search> in the <Search> menu. Motion Search
2. Use direction buttons (
◄ ►) to set the search criteria Channel CAM 01 Motion Region All Area Setup
If you set the motion area to <Manual Area>, the <Setup> button No.
7
Start Time
01:01:30
will be activated. 6
5
01:01:25
01:01:20
4 01:01:15
- Current Area : Searches for the motion area for each Play Return
• Preview : Select a data item in the list to display the still Individual Apply to All CH
Play
You can play data stored in the HDD and backup a desired portion of the data.
Using the mouse may help make setup easier.
1. In Live mode, click <Play> in the right-click menu or 2015-01-01 01:10:25
< > in the launcher menu, or press the Play button on Scene Mode
Spot Out
the remote control or the front panel.
• Backup : Click < > to set the current time to the start Backup Range
time of backup; you can specify a backup area using the
x Start 2015-01-01 00:01:06 x End 2015-01-01 01:10:25
mouse (yellow triangle).
Click < > again to set the current time to the end time of x Device
x Folder
USB
/20150101/
x Type
x File Name
SEC
0001 Change
the backup and the “Backup Range” window appears. Check capacity Backup :
Used :
English _85
search & play
Using the Playback Button
REC
Play Timeline Indicates the current playback point, and can be used to move.
c
Backward Fast
Used for quick backward playback. (2 - 64x speed)
Play
Backward Slow
Used for backward frame-by-frame search while in PAUSE. (1/2 - 1/8x speed)
Play
Ensured to play forward up to 4 channels simultaneously at a low speed. (1/2 - 1/8x speed)
Forward Slow
In a split mode, the real time playback may not be supported, depending on the record quality,
Play
resolution and number of channels. And some frame rates may be supported.
Forward Fast Play Used for quick forward playback. (2 - 64x speed)
Skip Forward Moves forward by unit time. (Move by 10 minutes)
Begins backup of the selected section of the video being played, with the specified starting/ending
Partial Backup
point.
Click a desired playback mode or press [MODE] to switch the screen mode in sequence.
Mode Switch The grey area in the center of the 13-split mode plays the Live channel.
The default channel of the Live mode is CH1, which can be changed later.
● WEB VIEWER
access to live video, archived video, PTZ control
(if configured), etc.
Product Features
Network
• Remote access from a standard browser
• Supports PTZ camera controls
• Supports 1, 4, 9, 16 camera viewing formats (maximum of
G
System Requirements
The following lists the recommended suggest hardware and operating system requirements needed to run
the Web Viewer.
Memory 4 GB or more
English _87
web viewer
CONNECTING WEB VIEWER (Windows)
1. Open your web browser and type the IP address or URL of
DVR into the URL address box.
● WEB VIEWER
6. When the program is installed, open the web viewer again
to login.
Live Viewer's main screen appears when you log in
successfully after installing the program.
English _89
web viewer
USING LIVE VIEWER (Windows)
The Live Viewer screen consists of following :
b
c
Menu Functions
Menu Selection Switches into corresponding menu screen by clicking each menu.
b Address, Name, Time Displays the IP, model name, time, etc. of connected DVR.
c DVR Time, PC Time Select <DVR Time> or <PC Time> for the OSD time information display setting of the Live Viewer.
Split Mode Selection Selects the type of split screen and specify the channel displayed in Display Pane.
Change Channel
Switches into previous/next channel or perform Auto Sequence.
Click Auto Sequence button to display the Time Interval Selection menu.
PRINT Prints current video image for selected channel through designated printer.
AVI Save
Records the live video in AVI file format in designated path, and then stops recording.
Recording status icon is displayed on screen during recording.
● WEB VIEWER
User ID Displays the user's ID.
Dual Stream selection : If you right-click a channel among the web viewer live screens, a dropdown menu, 'network
M stream/record stream' is shown. The default setting is 'network stream'. In this setting, videos are displayed in
'network stream' resolution. If 'record stream' is selected, videos are displayed in 'record stream' resolution.
Connected DVR
This displays the IP address and the status of the connecting
DVR.
English _91
web viewer
Split-Screen
Click split mode selection button to switch to the
corresponding screen mode.
● WEB VIEWER
3rd 4 channels (9~12) 4th 4 channels (13~16).
- In NINE MODE, the screens are changed from 9 channels (1~9) to 7 channels (10~16).
• : When this button is clicked, the next screen appears.
- In SINGLE MODE, the channel numbers are sequentially switched from 1 to 16.
- In QUAD MODE, the screens are changed like 1st 4 channels (1~4) 2nd 4 channels (5~8)
3rd 4 channels (9~12) 4th 4 channels (13~16).
- In NINE MODE, the screens are changed from 9 channels (1~9) to 7 channels (10~16).
• : When this button is clicked, screens are switched at a
preset interval.
- In SINGLE MODE, the channel numbers are sequentially
switched from 1 to 16.
- In QUAD MODE, the screens are changed like
1st 4 channels (1~4) 2nd 4 channels (5~8)
3rd 4 channels (9~12) 4th 4 channels (13~16).
- In NINE MODE, the screens are changed from 9 channels (1~9) to 7 channels (10~16).
Default setting time (10 seconds)
To capture a screen
1. Click < > button.
When a pop-up window appears, select the saving path
for captured image.
2. Select the path and name the file. And then click the
<Save> button.
3. Save current camera’s video image as .bmp, .jpg or .png
file.
English _93
web viewer
To print a screen
1. Click < > button.
2. Print current camera’s video image with the printer
connected to the PC operating the Web Viewer.
To save as AVI
1. Click < > button.
When “AVI Setup” window appears, select the record
saving path and capacity.
2. Select a desired path, enter the maximum recording
capacity, and then click <OK> button.
Save current channel’s video as AVI file. For playing a video clip,
you can use the free video player to play the video.
(ex: GOM Player, KM Player, etc.)
After saving an AVI file, install the CODEC when playing it in Windows Media Player.
However, the video may not played properly, depending on the CODEC compliance of the player.
At least 1GB of free space is required for recording.
While recording current data in Web Viewer, you cannot select Split Mode buttons, switch to the previous/next
J screen, or activate Auto Sequence function.
If the viewer is running without the administrator’s permission in Windows Vista / 7, you may not change a folder
when saving a video as AVI file.
Audio
• : Sets audio of each connected channel to On/Off.
OSD
• : Select Show OSD on the Live screen.
Controlling PTZ
If PTZ camera is connected, the < > icon appears on screen. When selecting corresponding camera
channel, the PTZ tab is provided to allow you to control the PTZ.
● WEB VIEWER
c
c Preset
Sets the preset position for camera framing and moves to designated preset position
when selecting a desired preset.
Swing Moves between the preset start point and end point.
Group Moves in the path specified by combining the preset, pattern and auto pan.
ZOOM Zooms in/out the image by controling camera’s zoom.
English _95
web viewer
To set a preset
1. Click < > button to display “Preset” window.
2. Click < > to select a desired preset number.
3. Enter the name of preset.
4. Use direction keys to adjust the direction which camera
aims at.
5. Click the <RECORD> button.
● WEB VIEWER
b
For more information about camera’s OSD menu, refer to corresponding user manul of each camera.
M
English _97
web viewer
USING SEARCH VIEWER
The Search Viewer screen consists of following :
Up to 3 users can access simultaneously.
b
c
Menu Functions
Menu Selection Switches to the corresponding menu screen by clicking each menu.
b Address, Name, Time Displays the IP, model name, time, etc. of connected DVR.
Split Mode Selection Selects the type of split screen and selects the channel displayed in Display Pane.
c Backup Connected camera videos are backed up manually.
PRINT Prints current video image for selected channel through designated printer.
AVI Save
Records the live video in AVI file format in designated path, and then stops recording.
Recording status icon is displayed on screen during recording.
Calendar
Displays the video-recorded date in blue and today in white. Click the date in blue color
to display the recorded video information in timeline.
Overlapped Data
Displays and zooms in/out recorded video data. If overlapping data found, this function
selects one of them to play.
Play Control Adjusts current video’s playback speed and played time position.
Recording Color
Displays the corresponding color depending on recorded data type if you place your
mouse cursor on that area.
Display Pane Plays corresponding data on the screen if you select a search result.
● WEB VIEWER
User ID Displays the user's ID.
To search by date
You can select the search date by using calendar.
1. Click < > or < > to select the year to search.
2. Click < > or < > to select the month to search.
The date including data appears in blue and today
appears in red.
3. Click the date to search in calendar.
The first image of searched video data on the date is displayed on screen and the data is displayed in the
timeline.
4. To search video data on today, click < >.
Today’s date is selected. (PC Time)
To adjust timeline
If searched data are overlapping, you can select a desired data, move its playback time point, and zoom in/
out the timeline.
1. Select the number of data to search if data is overlapping.
It appears only when data are overlapped and assigns <0> to the most recent data.
2. Click your desired time point to play on the timeline.
The playback start point is moved.
3. Click < >, < > to zoom in/out the zoom factor to display time.
4. To show the previous/next timeline in zoomed-in status, click < > or < > to go to the left or right.
English _99
web viewer
Names and Functions of Play Buttons
Moves backward by 10 minutes from the current playing b c
point.
b Plays in reverse at doubled speed. The playback speed is
doubled up to 64x speed.
c Moves backward by 1 second from current playing point.
Moves forward by 1 second from current playing point.
Plays at doubled speed. The playback speed is doubled up to 64x speed.
Moves forward by 10 minutes from the current playing point.
Moves to the recording start point on the corresponding timeline.
Plays in reverse.
Stops playing. When resuming playback, it is played from the recording start point.
Pauses playing. When resuming playback, it is played from the stopped point.
Plays normally.
Moves to the recording end point on the corresponding timeline.
System
You can configure the various settings of the DVR system.
Date/Time/Language
● WEB VIEWER
For more information, refer to <Date/Time/Language> in the <System Setup> menu. (Page 38)
1. Select <Date/Time/Language> in the System menu.
2. Configure the DVR settings according to your system environment.
• Date/Time
Set the date and time.
English _101
web viewer
Holiday
You can set specific dates to Holidays according to your preferences.
For more information, refer to <Setting Holiday> in the <System
Setup> menu. (Page 39)
Permission Management
For more information, refer to <Permission Management> in the <System Setup> menu. (Page 40)
• Admin
You can change the admin ID or the password.
You can type the ID with alphanumeric characters only.
For the password, use alphabets and special characters excluding <\> and
<">.
If you click < >, a simple guideline to setting the password is shown.
• Group
Users are classified into groups and the permission can be
set according to the group.
First of all, add a group.
● WEB VIEWER
• Setup
You can set the user permission.
System Management
For more information, refer to <System Management> in the <System Setup> menu. (Page 44)
• System Information
You can see information of the current system.
Check the Software Version, Broadcast Format and MAC Address.
Vx.xxh_yymmddhhmmss
English _103
web viewer
Device
You can check a list of devices that are connected to the DVR and configure the necessary settings.
Click <Device> in the menu screen.
For more information, refer to “Setting the Device”. (Page 48)
Camera
• Camera
You can configure the settings of the camera that is connected to the
DVR.
• Privacy Region
You can specify a certain area of the camera video to be protected for
your privacy.
• PTZ
You can configure the settings of the PTZ camera that is connected to
the DVR.
Set the ID and protocol.
● WEB VIEWER
• HDD Alarm
You can set the alarm output channel and the alarm duration for an
error.
Remote Device
You can see a list of remote devices including PTZ cameras and
system keyboards that are connected to the RS-485 port of the DVR
and configure the necessary settings.
English _105
web viewer
POS Device
You can set the channel, preset and communication port of the POS
device that is connected to the DVR.
Monitor
• Monitor
You can configure the monitoring screen settings and set the output
system.
• Mode
You can switch between live mode and play mode.
Recording Schedule
If you set a recording schedule for a specific date and time, the
recording will start at that specific time.
● WEB VIEWER
- Apply to All CH : Click <Apply to All CH> to display the
confirmation window.
English _107
web viewer
REC Quality & Resolution
• Standard/Event
You can set the resolution, frame rate and recording quality for each
channel.
Record Option
You can set the Disk End Mode.
Event
For more information, refer to <Setting the Event>. (Page 61)
Sensor Detection
You can set the sensor operation mode and the synchronized camera
as well as the alarm output type and the duration.
● WEB VIEWER
• Motion Region
Set the target motion detection area.
Tampering Detection
You can set whether to generate alarm and its dwell time for video
tampering events.
English _109
web viewer
Alarm Schedule
You can schedule the alarm output according to the day of the week
and the time.
The default setting is Event Sync, which activates the alarm only if an
event occurs.
Network
For more information, refer to <Network Configuration>. (Page 66)
Connection Mode
A remote user can access the DVR via the network to check the current mode and the IP address.
• Interface
You can set the network connection route.
• Port
You can configure the protocol related settings.
● WEB VIEWER
DDNS
You can check the DDNS settings.
Live Transfer
Sets the quality of the image that is transferred from the DVR to the network.
• Live Transfer
A remote user can set the image resolution of the transferred data.
English _111
web viewer
Mailing Service
You can specify the SMTP server that sends a mail if an event occurs and set the recipient group and users.
• SMTP
You can set the server that sends mails and specify if you use the
authentication process.
• Event
You can set the event interval and specify which events the server
sends mails for.
• Group
You can add a group to receive the mail if an event occurs and set the
permission to receive the event mail for each group.
● WEB VIEWER
SNMP
You can configure the settings for the SNMP protocol.
INFORMATION
Click <Information>.
Displays the model name of connected DVR and the version of Web Viewer.
English _113
web viewer
CONNECTING WEB VIEWER (Mac)
Safari on MAC.
If you want to use SRD-Series DVR Web Viewer with Safari Browser on a Mac, please refer to this user guide
and install Multi Viewer with firmware upgrade if necessary.
• Mac OS versions available : 10.6 or later version
• Silverlight : 5 or later
• Safari : 5 or later
1. Click [Click now to Install] to display the installation
screen as shown.
If automatic proxy is activated and an invalid DNS server is specified while configuring network, the Internet access
M may not be available.
● WEB VIEWER
For more details on using the Web Viewer, please refer to “Connecting Web Viewer (Windows)”. (Page 88)
English _115
web viewer
USING LIVE VIEWER (Mac)
The Live Viewer screen consists of following :
b
c
Menu Functions
Change Channel
Switches into previous/next channel or perform Auto Sequence.
Click Auto Sequence button to display the Time Interval Selection menu.
PRINT Prints current video image for selected channel through designated printer.
Starts and stops recording.
RECORD If you cannot play the file recorded from the web, please install the H.264 CODEC.
ex) MAC: perian_1.2.3.dmg (http://perian.org)
Display Pane Displays the video of camera connected to DVR.
● WEB VIEWER
MOBILE VIEWER
Key Features
• Remote access via Smart phone
• Voice Recognition
• 1-split and 4-split modes supported in Live Viewer
• Supports single channel search function
• Switch channels using the touch-sensitive LCD panel
• PTZ camera operations supported
(complies with the protocol of the connected DVR)
• Up to 16 channels supported
Compatible Smartphone
2.X
This application is optimized for 20xx. xx. xx
• iOS v6.1, v7.0 (iPhone 4/5, iPad 2/3/4)
• Optimized for Android v4.x.
Some features (e.g. Favorite list) may work abnormally in Android
v2.x.
Android v5.x or above may show v.loss due to OS compatibility.
Use lower resolutions for multi-split view.
English _117
backup viewer
SEC BACKUP VIEWER
You can play a file that is backed up in the format of SEC.
Backup in SEC format produces backup data file, library file and self-executable viewer file.
If you run the backup file viewer, the backup data file will be automatically played.
b c
SRD-1694_CAM 01
Recommended System Requirements
PCs with a lower specification than the recommended below may not fully support forward/backward and
high-speed playback.
• OS : Windows XP professional, Windows Vista, Windows 7
• CPU : Intel i5 2.8GHz or faster
• RAM : DDR PC-3200 1G or more
• VGA : Geforce 6200 or higher
● BACKUP VIEWER
You can also use the slide bar ( ) in the pop-up window to zoom in/out.
Press ( ) on a size-changed video to restore the default zoom factor
b Digital Zoom (100%).
If you enlarge the image by more than 200%, the enlarged area will be
marked on the digital zooming screen. Click on the marked area and move it
to a desired position.
The digital zooming is applied to all backup viewer. When the digital zooming
is canceled, the video size will restore the default rate of 100%.
Saves the current video’s image as in an image file. Supports jpeg file format.
c Screen Printout
Prints out the current screen. You should have installed the appropriate printer
driver before you can print out the screen.
A toggle button. Each time you press this button, the audio output will toggle
/
between activated and deactivated.
Audio
You can adjust the volume level from 0 to 100.
Watermark / Press the button to enable file tampering detection, to detect data file forging.
Check the OSD checkbox to display the OSD information on the backup
Show OSD
playback screen.
Information such as backup date, day of the week, time, model name, and
channel number will be displayed on the screen.
Collapses the time range that is displayed on the range bar of the storage
time. You can collapse the range bar until the overall range is shortened to
24 hours.
Enlarge /
Reduce Timeline
Enlarges the time range that is displayed on the range bar of the storage
time. You can enlarge the range bar until the overall range is extended to
1 minute.
Playback Control You can adjust the video playback of the timeline.
If it has a high recording rate and is played at high speed playback of 16x or higher speed in the backup viewer,
M actual playback speed may not reach the set playback speed.
English _119
appendix
PRODUCT SPECIFICATION
Item Details
16channel BNC
Inputs 1080P/720P AHD Camera
Video NTSC/PAL
Resolution 1920 x 1080, 1280 x 720, 960 x 480, 704 x 480 / 960 x 576, 704 x 576
Frame rate 480fps, 400fps
Live Resolution 1920 x 1080, 1280 x 720, 960 x 480, 704 x 480 / 960 x 576, 704 x 576
Multi Screen display 1/4/7/9/13/16/16A/PIP/Sequence
Performance
Operating System Embedded Linux
Compression H.264
y SRD-1694
NTSC: Up to 480fps @ 1920x1080 / PAL: Up to 400fps @ 1920x1080
NTSC: Up to 480fps @ 1280x720 / PAL: Up to 400fps @ 1280x720
NTSC: Up to 480fps @ 928x480 / PAL: Up to 400fps @ 928x576
NTSC: Up to 480fps @ 704x480 / PAL: Up to 400fps @ 704x576
NTSC: Up to 480fps @ 704x240 / PAL: Up to 400fps @ 704x288
NTSC: Up to 480fps @ 352x240 / PAL: Up to 400fps @ 352x288
Record Rate
y SRD-1685
NTSC: Up to 192fps @ 1920x1080 / PAL: Up to 192fps @ 1920x1080
NTSC: Up to 480fps @ 1280x720 / PAL: Up to 400fps @ 1280x720
Recording NTSC: Up to 480fps @ 928x480 / PAL: Up to 400fps @ 928x576
NTSC: Up to 480fps @ 704x480 / PAL: Up to 400fps @ 704x576
NTSC: Up to 480fps @ 704x240 / PAL: Up to 400fps @ 704x288
NTSC: Up to 480fps @ 352x240 / PAL: Up to 400fps @ 352x288
NTSC: Manual, Schedule (Continuous/Event), Event(Pre/Post), Time lapse (1~30 fps)
Mode
PAL: Manual, Schedule (Continuous/Event), Event(Pre/Post), Time lapse (1~25 fps)
Event Video Loss, Motion(Level 1~10), Alarm, Tampering(Level Low, Medium, High)
Overwrite modes Continuous
Pre-alarm Up to 30 sec (5, 10, 20, 30 Sec)
Post-Alarm Up to 6 hour (5, 10, 20, 30 sec, 1, 3, 5, 10, 20 min, 1, 2, 3, 4, 5, 6 hour)
Date/time, Event, Back up, Pos(SD only), Motion (※ All Search Included Preview
Search mode
Function)
y Fast Forward/Backward (x2, x4, x8, x16, x32, x64)
Search & Playback ※ Backward Play with I-frame Only
Playback function y Slow Forward/Backward (x1/2, x1/4, x1/8)
y Step Forward/Backward (x2, x4, x8, x16, x32, x64)
※ Backward Play with I-frame Only
120_ appendix
Item Details
yy SRD-1694
Record Stream) 1M ~ 2M (NTSC : 480fps, PAL : 400fps), 4CIF (NTSC : 480fps,
PAL : 400fps)
Network Stream) 4CIF / 2CIF / CIF (NTSC : 120 / 240 / 480fps, PAL : 100 / 200 /
400fps)
Transmission speed
yy SRD-1685
Record Stream) 1M ~ 2M (NTSC : 192fps, PAL : 192fps, 4CIF (NTSC : 480fps,
PAL : 400fps)
Network Stream) 4CIF / 2CIF / CIF (NTSC : 120 / 240 / 480fps, PAL : 100 / 200 /
●● APPENDIX
400fps)
Network (IPv4)
Bandwidth Up to 64Mbps
Bandwidth control Selectable
Stream Record Stream and Network Stream Selectable (at monitoring Viewer)
Remote users
Search(3)/Live Unicast(10)/Live Multicast(20)
Maximum
Protocol support TCP/IP, DHCP, PPPoE, SMTP, NTP, HTTP, DDNS, RTP, RTSP, SNMP
Monitoring Smart viewer, Web viewer, SSM(CMS)
Platform Android, iOS
Protocol support RTP, RTSP, HTTP, CGI
Smart phone
Remote users
Live (4), Search (1)
Maximum
yy SRD-1694
Up to 8 SATA HDDs (MAX:6Tx8=48T)
Internal HDD
yy SRD-1685
Up to 4 SATA HDDs (MAX:6Tx4=24T)
yy SRD-1694
External (e-SATA Up to 2 expansion bay
Interface) yy SRD-1685
Storage
Up to 2 expansion bay (※ Model: SVS-5R/5E)
DVD Writer
-
(Back-up)
USB (Mouse/Back-up) USB 2.0, 2 ports (Front1, Back1)
File Format
BU(DVR Player), SEC(Include Player), AVI
(Back-up)
Password Protection 1 Admin, 10 Group, 10 User per 1 Group
Security
Data Authentication Watermark
Interface
VGA 1 VGA (1280x720, 1280x1024, 1920x1080)
HDMI 1 HDMI (1280x720, 1280x1024, 1920x1080)
Monitors
Main Composite -
Spot(Composite) Digital Spot (1CH) : OSD On Screen, Multi mode Support
English _121
appendix
Item Details
Inputs/Output 16CH line in (Built in 4CH, Option : Audio Extension Cable) / 1CH line out
Audio Compression G.711
Sampling rate 8KHz
Terminal 16 Inputs (NO/NC) / Terminal 4 relay Outputs (NO/NC), Rating : 30V
Inputs/Outputs
Alarm DC/2A, 250V AC/0.25A
Remote notification Notification via e-mail
Ethernet 1 RJ45 10/100/1000 Base-T
Serial interface RS-232/RS-485(Full Duplex) for PTZ, Samsung System Keyboard
USB USB 2.0, 2 ports
122_ appendix
PRODUCT OVERVIEW
• SRD-1694/1685
unit : mm(inch)
● APPENDIX
395.9 (15.59”)
440 (17.32”) 384.8 (15.14”)
88 (3.46”)
95.9 (3.78”)
English _123
appendix
DEFAULT SETTING
This returns the factory default settings.
The settings are made as follows;
• Use System/Load Factory Default in MENU
The default settings are based on SRD-1685.
The default administrator ID is “admin”, and the password must be set when the user log in at the first time.
To prevent from your personal information being exposed, please change your password every 3 months. Note that the security and other
related issues caused by careless management of password shall be be in the charge of the user.
124_ appendix
Category Details Factory Default
Check Alarm Output Port OFF
Duration OFF
Storage Device HDD Alarm
Replace Alarm Output Port OFF
Duration OFF
Baudrate 9600
Parity None
● APPENDIX
Data 8
Remote Device
Stop bit 1
System Keyboard OFF
Remote Control ON(0)
POS Device OFF
Device
Event Display OFF
Display All
Multi CH SEQ Time 5 sec
Monitor
VGA/HDMI 1920 x 1080
HDMI Resolution Auto
ON
Monitor Detection
Multi Spot OFF
Spot Out Spot Out SEQ
Event Display OFF
Live Screen ALL
Mode
Play Screen ALL
Recording Schedule CH1~CH16 Both(Cont&Evnt)
PRE Event OFF
Event Record Duration
POST Event 1 min
Resolution CIF
NTSC: 7fps
Normal Recording Frame Rate
PAL: 5fps
Record Quality Level 4
Recording REC Quality/Resolution
Resolution 4CIF
NTSC: 7fps
Event Frame Rate
PAL: 5fps
Record Quality Level 4
Setup Overwrite
Disk End Mode
Record Option Disk End Beep OFF
Auto Delete OFF
English _125
appendix
Category Details Factory Default
Sensor Operation OFF
Camera Camera No.
Sensor Detection
Alarm None
Alarm Duration 10 sec
Mode OFF
Sensitivity Level10(high)
Motion Detection Alarm None
Alarm Duration 10 sec
Event Motion Region All Area
Video Loss State OFF
Video Loss Detection Alarm None
Alarm Duration 10 sec
Mode OFF
Sensitivity Medium
Tampering Detection
Alarm None
Alarm Duration 10 sec
Alarm Schedule Alarm1 Event Sync
126_ appendix
Category Details Factory Default
IP Type Static
Transfer Bandwidth 2Mbps
IP Address 192.168.1.200
Interface
Gateway 192.168.1.1
Subnet Mask 255.255.255.0
DNS 168.126.63.1
● APPENDIX
Connection Mode
Protocol Type TCP
Device Port 4520~4524
Port
HTTP Port 80
Secure Video Transmission OFF
Disconnect Alarm Output Port OFF
Alarm
Duration OFF
English _127
appendix
TROUBLESHOOTING
Symptom Countermeasures
The system does not turn on and the indicator on the y Check if the power supply system is properly connected.
front panel does not work at all. y Check the system for the input voltage from the power source.
y If the problem persists even after you have taken the above actions,
check the power supplier and replace it with a new one if neccessary.
Some channels display just a black screen even if y Check if the camera connected to the system properly displays the
they receive video sources. image. Sometimes, this problem may occur on a camera that is not
properly connected to the video source.
y Check if the camera is properly supplied with power.
y Sometimes, this problem may occur on a channel with weak video
signal from a video distributor that is connected to multiple systems. In
this case, input the video source of the camera directly into the DVR.
This may find the cause and solve the problem.
If I press the [REC] button on the front panel, the y Check if there is a free space on the HDD for the recording.
REC indicator does not flash, nor the player start y Check if the record mode is set to ON in the record mode setting.
recording.
The screen displays the logo image repeatedly. y This may occur from a problem with the main board, or the related
software is corrupt.
Contact the nearest service center for more information.
The Channel button does not work on the Live y The Channel button does not work if the current screen is in the event
screen. monitoring mode.
In the event monitoring screen, press the [ALARM] button to exit the
screen and select a channel.
The cursor will not move to the Start button when I y Check if the channel and the date that you want to play are marked
start the calendar search. with the V symbol.
Both channel and date should be checked before you can start playing
with the Start button.
When the alarm sounds, I press the [ALARM] button y Press the [MENU] button on the front panel to release the alarm in the
on the front panel to release the alarm but it does following way:
not work. The alarm persists and I could not set it off 1) To release the event monitoring mode : Monitoring Mode – set the
in any way. duration of the event monitoring to Off.
2) To release the alarm sound : Event Record Mode - Alarm (Motion
Detection/Video Loss/Tampering Detection) – deactivate the alarm
sound.
3) To release the event : Event Record Mode - Alarm (Motion Detection/
Video Loss/Tampering Detection) – set the mode to Off.
No response is made even if I press the [PTZ] button y Menu Camera Check if the current protocols and other settings
on the Live screen. in the PTZ device are properly configured according to the PTZ camera.
128_ appendix
Symptom Countermeasures
I've found that the DVR does not recognize as many y It takes time for the DVR to recognize multiple external HDDs. Try again
disks as installed when I have connected multiple in a moment and if the problem (of failure to recognize as many HDDs
external HDDs to the DVR. as connected) persists, it may occur due to a mechanical error of the
HDD installed. Try again with a different HDD.
A message of “Need to reset date/time.” Is displayed y This message is displayed if there occurs a problem with the time
on the screen. setting of the internal clock or an error in the clock itself.
Contact the retailer or the service center for more information.
● APPENDIX
The time bar is not displayed in Search mode. y The timeline can switch between normal and extension mode.
In extension mode, the time bar may not be displayed in the current
timeline. Switch to normal mode or use the left or right button to
navigate through the time bar.
The “NO HDD” icon and an error message are y Check the HDD for connection. If the problem persists in a normal
displayed. condition, contact the nearest service center to have the HDD checked
by the service personnel.
I have installed an additional HDD on the DVR but it y See the compatibilty list to check if the additional HDD is supported by
does not recognize the HDD. the DVR. For the compatibility list, contact the retailer where you
purchased the DVR.
I have connected an external storage device (external y See the compatibility list of external storage devices to check if the
SATA HDD) to the DVR but the DVR seems not to connected device is supported by the DVR.
recognize it. For the compatibility list, contact the retailer where you purchased the
DVR.
I found it difficult to configure the network settings if y For more information, refer to the user manual.
using the default search, backup and router settings. y If you want to check the basics of the product for a quick start, refer to
the quick start guide (backup, search).
y If you use the router for network connection, refer to the “Connecting
to the Internet using the router” section in this manual.
Backup data is just not played by the PC or DVR. y When you are backing up data, you have choices about the player
either: PC or DVR. Make your selection before proceeding.
y If you are using the PC to play the data, the format of the backup file
should be either SEC.
y If you are using the DVR for this purpose, formatting backup files should
be done by the DVR.
My player does not switch to Live mode while in y Press the Stop [@] button on the DVR or the remote control, or click the
playback. [ ] icon on the launcher to switch to Live mode.
English _129
appendix
Symptom Countermeasures
Recording does not work. y If your player does not display a Live image at all, that indicates
recording does not work so first check if you see an image on the
screen.
y Recording does not work if the recording settings are not properly
configured.
1) Manual Record: Press the [REC] button on the front panel of the DVR
or on the remote control to start recording.
2) Scheduled Record: Specify a desired time in Menu – Record –
Recording Schedule. Recording will start at the specified time.
- <Continuous> Record: Recording will proceed in any conditions
at the specified time.
- <Event> Record: When an event occurs, recording will perform
only if the event is of alarm, motion detection, video loss and
Tampering Detection.
If there is no event found, recording will not perform.
- <Continuous / Event> Record: If there is no event found,
Continuous recording will perform. Whereas, if an event occurs,
Event recording will perform.
The image quality of the recording data is not good. y Increase the resolution and quality level in Menu – Record – Quality /
Resolution.
1) Resolution: Select a bigger size when specifying the recording size.
(720P/1080P>WD1>4CIF>2CIF>CIF)
The recording image in the CIF format shows a deteriorated quality
as it is enlarged from a small-sized image.
2) Record Quality: Specify a bigger level for the recording quality.
y If you increase the resolution and the recording quality, the data size
increases accordingly. So the HDD will be filled faster. Overwriting will
overwrite the existing data so recording will proceed at a shorter
interval.
130_ appendix
OPEN SOURCE ANNOUNCEMENT
The software included in this product contains copyrighted software that is licensed under the GPL/LGPL. You may obtain the complete
Corresponding Source code from us for a period of three years after our last shipment of this product by sending email to [email protected]
If you want to obtain the complete Corresponding Source code in the physical medium such as CD-ROM, the cost of physically performing source
distribution might be charged.
M For more details about Open Source, refer to the CD.
• GPL Software : linux kernel, Sysvinit, dosfstools, wget, msmtp, busybox, cdrtools, dvd+rw-tools, iconv, smartctl, uboot, minicom, openssl, bash,
lm_sensors, parted, procps, util-linux 2.19.1, xfsprogs 3.1.7
• LGPL Software : glibc, vmstat, inetutils, calendarview.js, libiconv
• OpenSSL License : OpenSSL
• Boost Software License: Boost-1.43.0 (http://www.boost.org/)
• COMMON DEVELOPMENT AND DISTRIBUTION LICENSE: cdrtools 2.01.01
• FreeType Project LICENSE: freetype2
• RSA MD4 or MD5 Message-Digest Algorithm License : MD5 Message Digest Code
• MIT License : JQuery, Prototype JavaScript framework, FJCore
GNU GENERAL PUBLIC LICENSE Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of running
Version 2, June 1991 the Program is not restricted, and the output from the Program is
Copyright (C) 1989, 1991 Free Software Foundation, Inc. covered only if its contents constitute a work based on the Program
(independent of having been made by running the Program). Whether
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA that is true depends on what the Program does.
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed. 1. You may copy and distribute verbatim copies of the Program’s
source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate
Preamble copyright notice and disclaimer of warranty; keep intact all the notices
The licenses for most software are designed to take away your freedom that refer to this License and to the absence of any warranty; and give
to share and change it. By contrast, the GNU General Public License is any other recipients of the Program a copy of this License along with
intended to guarantee your freedom to share and change free software the Program.
to make sure the software is free for all its users. This General Public You may charge a fee for the physical act of transferring a copy, and
License applies to most of the Free Software Foundation’s software and you may at your option offer warranty protection in exchange for a fee.
to any other program whose authors commit to using it. (Some other
Free Software Foundation software is covered by the GNU Lesser 2. You may modify your copy or copies of the Program or any portion of
General Public License instead.) You can apply it to your programs, too. it, thus forming a work based on the Program, and copy and distribute
such modifications or work under the terms of Section 1 above,
When we speak of free software, we are referring to freedom, not price. provided that you also meet all of these conditions:
Our General Public Licenses are designed to make sure that you have
the freedom to distribute copies of free software (and charge for this a) You must cause the modified files to carry prominent notices
service if you wish), that you receive source code or can get it if you stating that you changed the files and the date of any change.
want it, that you can change the software or use pieces of it in new free b) You must cause any work that you distribute or publish, that in
programs; and that you know you can do these things. whole or in part contains or is derived from the Program or any
To protect your rights, we need to make restrictions that forbid anyone part thereof, to be licensed as a whole at no charge to all third
to deny you these rights or to ask you to surrender the rights. These parties under the terms of this License.
restrictions translate to certain responsibilities for you if you distribute c) If the modified program normally reads commands interactively
copies of the software, or if you modify it. when run, you must cause it, when started running for such
For example, if you distribute copies of such a program, whether gratis interactive use in the most ordinary way, to print or display an
or for a fee, you must give the recipients all the rights that you have. You announcement including an appropriate copyright notice and a
must make sure that they, too, receive or can get the source code. And notice that there is no warranty (or else, saying that you provide a
you must show them these terms so they know their rights. warranty) and that users may redistribute the program under these
conditions, and telling the user how to view a copy of this License.
We protect your rights with two steps: (Exception: if the Program itself is interactive but does not normally
(1) copyright the software, and (2) offer you this license which gives you print such an announcement, your work based on the Program is
legal permission to copy, distribute and/or modify the software. not required to print an announcement.)
Also, for each author’s protection and ours, we want to make certain These requirements apply to the modified work as a whole. If identifiable
that everyone understands that there is no warranty for this free sections of that work are not derived from the Program, and can be
software. If the software is modified by someone else and passed on, reasonably considered independent and separate works in themselves,
we want its recipients to know that what they have is not the original, so then this License, and its terms, do not apply to those sections when
that any problems introduced by others will not reflect on the original you distribute them as separate works. But when you distribute the
authors’ reputations. same sections as part of a whole which is a work based on the
Finally, any free program is threatened constantly by software patents. Program, the distribution of the whole must be on the terms of this
We wish to avoid the danger that redistributors of a free program will License, whose permissions for other licensees extend to the entire
individually obtain patent licenses, in effect making the program whole, and thus to each and every part regardless of who wrote it.
proprietary. To prevent this, we have made it clear that any patent must Thus, it is not the intent of this section to claim rights or contest your
be licensed for everyone’s free use or not licensed at all. The precise rights to work written entirely by you; rather, the intent is to exercise the
terms and conditions for copying, distribution and modification follow. right to control the distribution of derivative or collective works based on
the Program.
TERMS AND CONDITIONS FOR COPYING, In addition, mere aggregation of another work not based on the
DISTRIBUTION AND MODIFICATION Program with the Program (or with a work based on the Program) on a
volume of a storage or distribution medium does not bring the other
Version 2, June 1991 work under the scope of this License.
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 3. You may copy and distribute the Program (or a work based on it,
51 Franklin S under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:
0. This License applies to any program or other work which contains a a) Accompany it with the complete corresponding machine-readable
notice placed by the copyright holder saying it may be distributed under source code, which must be distributed under the terms of
the terms of this General Public License. The “Program”, below, refers Sections 1 and 2 above on a medium customarily used for
to any such program or work, and a “work based on the Program” software interchange; or,
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either b) Accompany it with a written offer, valid for at least three years, to
verbatim or with modifications and/or translated into another language. give any third party, for a charge no more than your cost of
(Hereinafter, translation is included without limitation in the term physically performing source distribution, a complete machine-
“modification”.) Each licensee is addressed as “you”. readable copy of the corresponding source code, to be distributed
under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to 10. If you wish to incorporate parts of the Program into other free
distribute corresponding source code. (This alternative is allowed programs whose distribution conditions are different, write to the author
only for noncommercial distribution and only if you received the to ask for permission. For software which is copyrighted by the Free
program in object code or executable form with such an offer, in Software Foundation, write to the Free Software Foundation; we
accord with Subsection b above.) sometimes make exceptions for this. Our decision will be guided by the
two goals of preserving the free status of all derivatives of our free
The source code for a work means the preferred form of the work for software and of promoting the sharing and reuse of software generally.
making modifications to it. For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control NO WARRANTY
compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
normally distributed (in either source or binary form) with the major THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
components (compiler, kernel, and so on) of the operating system on PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
which the executable runs, unless that component itself accompanies STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
the executable. PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
If distribution of executable or object code is made by offering access to NOT LIMITED TO, THE IMPLIED WARRANTIES OF
copy from a designated place, then offering equivalent access to copy MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
the source code from the same place counts as distribution of the THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
source code, even though third parties are not compelled to copy the THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
source along with the object code. DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License. Any attempt otherwise 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
to copy, modify, sublicense or distribute the Program is void, and will AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY
automatically terminate your rights under this License. However, parties OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
who have received copies, or rights, from you under this License will not PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
have their licenses terminated so long as such parties remain in full DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
compliance. CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
5. You are not required to accept this License, since you have not TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
signed it. However, nothing else grants you permission to modify or LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
distribute the Program or its derivative works. These actions are THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
prohibited by law if you do not accept this License. Therefore, by IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
modifying or distributing the Program (or any work based on the POSSIBILITY OF SUCH DAMAGES.
Program), you indicate your acceptance of this License to do so, and all
its terms and conditions for copying, distributing or modifying the
Program or works based on it. END OF TERMS AND CONDITIONS
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the original How to Apply These Terms to Your New Programs
licensor to copy, distribute or modify the Program subject to these
terms and conditions. You may not impose any further restrictions on If you develop a new program, and you want it to be of the greatest
the recipients’ exercise of the rights granted herein. You are not possible use to the public, the best way to achieve this is to make it free
responsible for enforcing compliance by third parties to this License. software which everyone can redistribute and change under these
terms.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues), To do so, attach the following notices to the program. It is safest to
conditions are imposed on you (whether by court order, agreement or attach them to the start of each source file to most effectively convey
otherwise) that contradict the conditions of this License, they do not the exclusion of warranty; and each file should have at least the
excuse you from the conditions of this License. If you cannot distribute “copyright” line and a pointer to where the full notice is found.
so as to satisfy simultaneously your obligations under this License and one line to give the program’s name and an idea of what it does.
any other pertinent obligations, then as a consequence you may not
distribute the Program at all. For example, if a patent license would not Copyright (C) yyyy name of author
permit royalty-free redistribution of the Program by all those who receive This program is free software; you can redistribute it and/or modify it
copies directly or indirectly through you, then the only way you could under the terms of the GNU General Public License as published by the
satisfy both it and this License would be to refrain entirely from Free Software Foundation; either version 2 of the License, or (at your
distribution of the Program. option) any later version.
If any portion of this section is held invalid or unenforceable under any This program is distributed in the hope that it will be useful, but
particular circumstance, the balance of the section is intended to apply WITHOUT ANY WARRANTY; without even the implied warranty of
and the section as a whole is intended to apply in other circumstances. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
It is not the purpose of this section to induce you to infringe any patents the GNU General Public License for more details.
or other property right claims or to contest validity of any such claims; You should have received a copy of the GNU General Public License
this section has the sole purpose of protecting the integrity of the free along with this program; if not, write to the Free Software Foundation,
software distribution system, which is implemented by public license Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
practices. Many people have made generous contributions to the wide Also add information on how to contact you by electronic and paper
range of software distributed through that system in reliance on mail. If the program is interactive, make it output a short notice like this
consistent application of that system; it is up to the author/donor to when it starts in an interactive mode:
decide if he or she is willing to distribute software through any other
system and a licensee cannot impose that choice. Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
This section is intended to make thoroughly clear what is believed to be type ‘show w’. This is free software, and you are welcome to
a consequence of the rest of this License. redistribute it under certain conditions; type ‘show c’ for details.
8. If the distribution and/or use of the Program is restricted in certain The hypothetical commands ‘show w’ and ‘show c’ should show the
countries either by patents or by copyrighted interfaces, the original appropriate parts of the General Public License. Of course, the
copyright holder who places the Program under this License may add commands you use may be called something other than ‘show w’ and
an explicit geographical distribution limitation excluding those countries, ‘show c’; they could even be mouse-clicks or menu items--whatever
so that distribution is permitted only in or among countries not thus suits your program.
excluded. In such case, this License incorporates the limitation as if You should also get your employer (if you work as a programmer) or
written in the body of this License. your school, if any, to sign a “copyright disclaimer” for the program, if
9. The Free Software Foundation may publish revised and/or new necessary. Here is a sample; alter the names:
versions of the General Public License from time to time. Such new Yoyodyne, Inc., hereby disclaims all copyright interest in the program
versions will be similar in spirit to the present version, but may differ in ‘Gnomovision’ (which makes passes at compilers) written by James
detail to address new problems or concerns. Hacker.
Each version is given a distinguishing version number. If the Program signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice This
specifies a version number of this License which applies to it and “any General Public License does not permit incorporating your program into
later version”, you have the option of following the terms and conditions proprietary programs. If your program is a subroutine library, you may
either of that version or of any later version published by the Free consider it more useful to permit linking proprietary applications with the
Software Foundation. If the Program does not specify a version number library. If this is what you want to do, use the GNU Lesser General
of this License, you may choose any version ever published by the Free Public License instead of this License.
Software Foundation.
GNU GENERAL PUBLIC LICENSE a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays “Appropriate Legal Notices” to the
Version 3, 29 June 2007 extent that it includes a convenient and prominently visible feature that
Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/> (1) displays an appropriate copyright notice, and (2) tells the user that
Everyone is permitted to copy and distribute verbatim copies of this license there is no warranty for the work (except to the extent that warranties
document, but changing it is not allowed. are provided), that licensees may convey the work under this License,
and how to view a copy of this License. If the interface presents a list of
user commands or options, such as a menu, a prominent item in the list
Preamble meets this criterion.
The GNU General Public License is a free, copyleft license for software
and other kinds of works. 1. Source Code.
The licenses for most software and other practical works are designed The “source code” for a work means the preferred form of the work for
to take away your freedom to share and change the works. By contrast, making modifications to it. “Object code” means any non-source form
the GNU General Public License is intended to guarantee your freedom of a work.
to share and change all versions of a program--to make sure it remains A “Standard Interface” means an interface that either is an official
free software for all its users. We, the Free Software Foundation, use the standard defined by a recognized standards body, or, in the case of
GNU General Public License for most of our software; it applies also to interfaces specified for a particular programming language, one that is
any other work released this way by its authors. You can apply it to your widely used among developers working in that language.
programs, too. The “System Libraries” of an executable work include anything, other
When we speak of free software, we are referring to freedom, not price. than the work as a whole, that (a) is included in the normal form of
Our General Public Licenses are designed to make sure that you have packaging a Major Component, but which is not part of that Major
the freedom to distribute copies of free software (and charge for them if Component, and (b) serves only to enable use of the work with that
you wish), that you receive source code or can get it if you want it, that Major Component, or to implement a Standard Interface for which an
you can change the software or use pieces of it in new free programs, implementation is available to the public in source code form. A “Major
and that you know you can do these things. Component”, in this context, means a major essential component
To protect your rights, we need to prevent others from denying you (kernel, window system, and so on) of the specific operating system (if
these rights or asking you to surrender the rights. Therefore, you have any) on which the executable work runs, or a compiler used to produce
certain responsibilities if you distribute copies of the software, or if you the work, or an object code interpreter used to run it.
modify it: responsibilities to respect the freedom of others. The “Corresponding Source” for a work in object code form means all
For example, if you distribute copies of such a program, whether gratis the source code needed to generate, install, and (for an executable
or for a fee, you must pass on to the recipients the same freedoms that work) run the object code and to modify the work, including scripts to
you received. You must make sure that they, too, receive or can get the control those activities. However, it does not include the work’s System
source code. And you must show them these terms so they know their Libraries, or general-purpose tools or generally available free programs
rights. which are used unmodified in performing those activities but which are
not part of the work. For example, Corresponding Source includes
Developers that use the GNU GPL protect your rights with two steps: interface definition files associated with source files for the work, and the
(1) assert copyright on the software, and (2) offer you this License giving source code for shared libraries and dynamically linked subprograms
you legal permission to copy, distribute and/or modify it. that the work is specifically designed to require, such as by intimate
For the developers’ and authors’ protection, the GPL clearly explains data communication or control flow between those subprograms and
that there is no warranty for this free software. For both users’ and other parts of the work.
authors’ sake, the GPL requires that modified versions be marked as The Corresponding Source need not include anything that users can
changed, so that their problems will not be attributed erroneously to regenerate automatically from other parts of the Corresponding Source.
authors of previous versions.
The Corresponding Source for a work in source code form is that same
Some devices are designed to deny users access to install or run work.
modified versions of the software inside them, although the
manufacturer can do so. This is fundamentally incompatible with the 2. Basic Permissions.
aim of protecting users’ freedom to change the software. The
systematic pattern of such abuse occurs in the area of products for All rights granted under this License are granted for the term of
individuals to use, which is precisely where it is most unacceptable. copyright on the Program, and are irrevocable provided the stated
Therefore, we have designed this version of the GPL to prohibit the conditions are met. This License explicitly affirms your unlimited
practice for those products. If such problems arise substantially in other permission to run the unmodified Program. The output from running a
domains, we stand ready to extend this provision to those domains in covered work is covered by this License only if the output, given its
future versions of the GPL, as needed to protect the freedom of users. content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of You may make, run and propagate covered works that you do not
software on general-purpose computers, but in those that do, we wish convey, without conditions so long as your license otherwise remains in
to avoid the special danger that patents applied to a free program could force. You may convey covered works to others for the sole purpose of
make it effectively proprietary. To prevent this, the GPL assures that having them make modifications exclusively for you, or provide you with
patents cannot be used to render the program non-free. facilities for running those works, provided that you comply with the
terms of this License in conveying all material for which you do not
The precise terms and conditions for copying, distribution and control copyright. Those thus making or running the covered works for
modification follow. you must do so exclusively on your behalf, under your direction and
control, on terms that prohibit them from making any copies of your
TERMS AND CONDITIONS copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the
0. Definitions. conditions stated below. Sublicensing is not allowed; section 10 makes
“This License” refers to version 3 of the GNU General Public License. it unnecessary.
“Copyright” also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks. 3. Protecting Users’ Legal Rights From Anti-Circumvention Law.
“The Program” refers to any copyrightable work licensed under this No covered work shall be deemed part of an effective technological
License. Each licensee is addressed as “you”. “Licensees” and measure under any applicable law fulfilling obligations under article 11 of
“recipients” may be individuals or organizations. the WIPO copyright treaty adopted on 20 December 1996, or similar
laws prohibiting or restricting circumvention of such measures.
To “modify” a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an When you convey a covered work, you waive any legal power to forbid
exact copy. The resulting work is called a “modified version” of the circumvention of technological measures to the extent such
earlier work or a work “based on” the earlier work. circumvention is effected by exercising rights under this License with
respect to the covered work, and you disclaim any intention to limit
A “covered work” means either the unmodified Program or a work operation or modification of the work as a means of enforcing, against
based on the Program. the work’s users, your or third parties’ legal rights to forbid
To “propagate” a work means to do anything with it that, without circumvention of technological measures.
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a 4. Conveying Verbatim Copies.
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the public, You may convey verbatim copies of the Program’s source code as you
and in some countries other activities as well. receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
To “convey” a work means any kind of propagation that enables other keep intact all notices stating that this License and any non-permissive
parties to make or receive copies. Mere interaction with a user through terms added in accord with section 7 apply to the code; keep intact all
notices of the absence of any warranty; and give all recipients a copy of A separable portion of the object code, whose source code is excluded
this License along with the Program. from the Corresponding Source as a System Library, need not be
You may charge any price or no price for each copy that you convey, included in conveying the object code work.
and you may offer support or warranty protection for a fee. A “User Product” is either (1) a “consumer product”, which means any
tangible personal property which is normally used for personal, family, or
5. Conveying Modified Source Versions. household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer
You may convey a work based on the Program, or the modifications to product, doubtful cases shall be resolved in favor of coverage. For a
produce it from the Program, in the form of source code under the particular product received by a particular user, “normally used” refers to
terms of section 4, provided that you also meet all of these conditions: a typical or common use of that class of product, regardless of the
a) The work must carry prominent notices stating that you modified status of the particular user or of the way in which the particular user
it, and giving a relevant date. actually uses, or expects or is expected to use, the product. A product
b) The work must carry prominent notices stating that it is released is a consumer product regardless of whether the product has
under this License and any conditions added under section 7. This substantial commercial, industrial or non-consumer uses, unless such
requirement modifies the requirement in section 4 to “keep intact all uses represent the only significant mode of use of the product.
notices”. “Installation Information” for a User Product means any methods,
c) You must license the entire work, as a whole, under this License procedures, authorization keys, or other information required to install
to anyone who comes into possession of a copy. This License will and execute modified versions of a covered work in that User Product
therefore apply, along with any applicable section 7 additional from a modified version of its Corresponding Source. The information
terms, to the whole of the work, and all its parts, regardless of must suffice to ensure that the continued functioning of the modified
how they are packaged. This License gives no permission to object code is in no case prevented or interfered with solely because
license the work in any other way, but it does not invalidate such modification has been made.
permission if you have separately received it. If you convey an object code work under this section in, or with, or
d) If the work has interactive user interfaces, each must display specifically for use in, a User Product, and the conveying occurs as part
Appropriate Legal Notices; however, if the Program has interactive of a transaction in which the right of possession and use of the User
interfaces that do not display Appropriate Legal Notices, your Product is transferred to the recipient in perpetuity or for a fixed term
work need not make them do so. (regardless of how the transaction is characterized), the Corresponding
Source conveyed under this section must be accompanied by the
A compilation of a covered work with other separate and independent Installation Information. But this requirement does not apply if neither
works, which are not by their nature extensions of the covered work, you nor any third party retains the ability to install modified object code
and which are not combined with it such as to form a larger program, in on the User Product (for example, the work has been installed in ROM).
or on a volume of a storage or distribution medium, is called an
“aggregate” if the compilation and its resulting copyright are not used to The requirement to provide Installation Information does not include a
limit the access or legal rights of the compilation’s users beyond what requirement to continue to provide support service, warranty, or
the individual works permit. Inclusion of a covered work in an aggregate updates for a work that has been modified or installed by the recipient,
does not cause this License to apply to the other parts of the or for the User Product in which it has been modified or installed.
aggregate. Access to a network may be denied when the modification itself
materially and adversely affects the operation of the network or violates
the rules and protocols for communication across the network.
6. Conveying Non-Source Forms.
Corresponding Source conveyed, and Installation Information provided,
You may convey a covered work in object code form under the terms of in accord with this section must be in a format that is publicly
sections 4 and 5, provided that you also convey the machine-readable documented (and with an implementation available to the public in
Corresponding Source under the terms of this License, in one of these source code form), and must require no special password or key for
ways: unpacking, reading or copying.
a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the 7. Additional Terms.
Corresponding Source fixed on a durable physical medium
customarily used for software interchange. “Additional permissions” are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
b) Convey the object code in, or embodied in, a physical product Additional permissions that are applicable to the entire Program shall be
(including a physical distribution medium), accompanied by a treated as though they were included in this License, to the extent that
written offer, valid for at least three years and valid for as long as they are valid under applicable law. If additional permissions apply only
you offer spare parts or customer support for that product model, to part of the Program, that part may be used separately under those
to give anyone who possesses the object code either (1) a copy of permissions, but the entire Program remains governed by this License
the Corresponding Source for all the software in the product that without regard to the additional permissions.
is covered by this License, on a durable physical medium
customarily used for software interchange, for a price no more When you convey a copy of a covered work, you may at your option
than your reasonable cost of physically performing this conveying remove any additional permissions from that copy, or from any part of it.
of source, or (2) access to copy the Corresponding Source from a (Additional permissions may be written to require their own removal in
network server at no charge. certain cases when you modify the work.) You may place additional
permissions on material, added by you to a covered work, for which
c) Convey individual copies of the object code with a copy of the you have or can give appropriate copyright permission.
written offer to provide the Corresponding Source. This alternative
is allowed only occasionally and noncommercially, and only if you Notwithstanding any other provision of this License, for material you add
received the object code with such an offer, in accord with to a covered work, you may (if authorized by the copyright holders of
subsection 6b. that material) supplement the terms of this License with terms:
d) Convey the object code by offering access from a designated a) Disclaiming warranty or limiting liability differently from the terms of
place (gratis or for a charge), and offer equivalent access to the sections 15 and 16 of this License; or
Corresponding Source in the same way through the same place at b) Requiring preservation of specified reasonable legal notices or
no further charge. You need not require recipients to copy the author attributions in that material or in the Appropriate Legal
Corresponding Source along with the object code. If the place to Notices displayed by works containing it; or
copy the object code is a network server, the Corresponding c) Prohibiting misrepresentation of the origin of that material, or
Source may be on a different server (operated by you or a third requiring that modified versions of such material be marked in
party) that supports equivalent copying facilities, provided you reasonable ways as different from the original version; or
maintain clear directions next to the object code saying where to
find the Corresponding Source. Regardless of what server hosts d) Limiting the use for publicity purposes of names of licensors or
the Corresponding Source, you remain obligated to ensure that it authors of the material; or
is available for as long as needed to satisfy these requirements. e) Declining to grant rights under trademark law for use of some
e) Convey the object code using peer-to-peer transmission, provided trade names, trademarks, or service marks; or
you inform other peers where the object code and Corresponding f) Requiring indemnification of licensors and authors of that material
Source of the work are being offered to the general public at no by anyone who conveys the material (or modified versions of it)
charge under subsection 6d. with contractual assumptions of liability to the recipient, for any
liability that these contractual assumptions directly impose on
those licensors and authors.
All other non-permissive additional terms are considered “further
restrictions” within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is governed
by this License along with a term that is a further restriction, you may
remove that term. If a license document contains a further restriction but
permits relicensing or conveying under this License, you may add to a In the following three paragraphs, a “patent license” is any express
covered work material governed by the terms of that license document, agreement or commitment, however denominated, not to enforce a
provided that the further restriction does not survive such relicensing or patent (such as an express permission to practice a patent or covenant
conveying. not to sue for patent infringement). To “grant” such a patent license to a
If you add terms to a covered work in accord with this section, you party means to make such an agreement or commitment not to enforce
must place, in the relevant source files, a statement of the additional a patent against the party.
terms that apply to those files, or a notice indicating where to find the If you convey a covered work, knowingly relying on a patent license, and
applicable terms. the Corresponding Source of the work is not available for anyone to copy,
Additional terms, permissive or non-permissive, may be stated in the free of charge and under the terms of this License, through a publicly
form of a separately written license, or stated as exceptions; the above available network server or other readily accessible means, then you must
requirements apply either way. either (1) cause the Corresponding Source to be so available, or (2)
arrange to deprive yourself of the benefit of the patent license for this
particular work, or (3) arrange, in a manner consistent with the
8. Termination. requirements of this License, to extend the patent license to downstream
You may not propagate or modify a covered work except as expressly recipients. “Knowingly relying” means you have actual knowledge that, but
provided under this License. Any attempt otherwise to propagate or for the patent license, your conveying the covered work in a country, or
modify it is void, and will automatically terminate your rights under this your recipient’s use of the covered work in a country, would infringe one or
License (including any patent licenses granted under the third paragraph more identifiable patents in that country that you have reason to believe
of section 11). are valid.
However, if you cease all violation of this License, then your license from If, pursuant to or in connection with a single transaction or arrangement,
a particular copyright holder is reinstated (a) provisionally, unless and you convey, or propagate by procuring conveyance of, a covered work,
until the copyright holder explicitly and finally terminates your license, and grant a patent license to some of the parties receiving the covered
and (b) permanently, if the copyright holder fails to notify you of the work authorizing them to use, propagate, modify or convey a specific
violation by some reasonable means prior to 60 days after the copy of the covered work, then the patent license you grant is
cessation. automatically extended to all recipients of the covered work and works
Moreover, your license from a particular copyright holder is reinstated based on it.
permanently if the copyright holder notifies you of the violation by some A patent license is “discriminatory” if it does not include within the scope
reasonable means, this is the first time you have received notice of of its coverage, prohibits the exercise of, or is conditioned on the
violation of this License (for any work) from that copyright holder, and non-exercise of one or more of the rights that are specifically granted
you cure the violation prior to 30 days after your receipt of the notice. under this License. You may not convey a covered work if you are a
Termination of your rights under this section does not terminate the party to an arrangement with a third party that is in the business of
licenses of parties who have received copies or rights from you under distributing software, under which you make payment to the third party
this License. If your rights have been terminated and not permanently based on the extent of your activity of conveying the work, and under
reinstated, you do not qualify to receive new licenses for the same which the third party grants, to any of the parties who would receive the
material under section 10. covered work from you, a discriminatory patent license (a) in connection
with copies of the covered work conveyed by you (or copies made from
those copies), or (b) primarily for and in connection with specific
9. Acceptance Not Required for Having Copies. products or compilations that contain the covered work, unless you
You are not required to accept this License in order to receive or run a entered into that arrangement, or that patent license was granted, prior
copy of the Program. Ancillary propagation of a covered work occurring to 28 March 2007.
solely as a consequence of using peer-to-peer transmission to receive a Nothing in this License shall be construed as excluding or limiting any
copy likewise does not require acceptance. However, nothing other implied license or other defenses to infringement that may otherwise be
than this License grants you permission to propagate or modify any available to you under applicable patent law.
covered work. These actions infringe copyright if you do not accept this
License. Therefore, by modifying or propagating a covered work, you
indicate your acceptance of this License to do so. 12. No Surrender of Others’ Freedom.
If conditions are imposed on you (whether by court order, agreement or
10. Automatic Licensing of Downstream Recipients. otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
Each time you convey a covered work, the recipient automatically covered work so as to satisfy simultaneously your obligations under this
receives a license from the original licensors, to run, modify and License and any other pertinent obligations, then as a consequence you
propagate that work, subject to this License. You are not responsible for may not convey it at all. For example, if you agree to terms that obligate
enforcing compliance by third parties with this License. you to collect a royalty for further conveying from those to whom you
An “entity transaction” is a transaction transferring control of an convey the Program, the only way you could satisfy both those terms
organization, or substantially all assets of one, or subdividing an and this License would be to refrain entirely from conveying the
organization, or merging organizations. If propagation of a covered work Program.
results from an entity transaction, each party to that transaction who
receives a copy of the work also receives whatever licenses to the work 13. Use with the GNU Affero General Public License.
the party’s predecessor in interest had or could give under the previous
paragraph, plus a right to possession of the Corresponding Source of Notwithstanding any other provision of this License, you have
the work from the predecessor in interest, if the predecessor has it or permission to link or combine any covered work with a work licensed
can get it with reasonable efforts. under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
You may not impose any further restrictions on the exercise of the rights License will continue to apply to the part which is the covered work, but
granted or affirmed under this License. For example, you may not the special requirements of the GNU Affero General Public License,
impose a license fee, royalty, or other charge for exercise of rights section 13, concerning interaction through a network will apply to the
granted under this License, and you may not initiate litigation (including combination as such.
a cross-claim or counterclaim in a lawsuit) alleging that any patent claim
is infringed by making, using, selling, offering for sale, or importing the 14. Revised Versions of this License.
Program or any portion of it.
The Free Software Foundation may publish revised and/or new versions
11. Patents. of the GNU General Public License from time to time. Such new
versions will be similar in spirit to the present version, but may differ in
A “contributor” is a copyright holder who authorizes use under this detail to address new problems or concerns.
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor’s “contributor version”. Each version is given a distinguishing version number. If the Program
specifies that a certain numbered version of the GNU General Public
A contributor’s “essential patent claims” are all patent claims owned or License “or any later version” applies to it, you have the option of
controlled by the contributor, whether already acquired or hereafter following the terms and conditions either of that numbered version or of
acquired, that would be infringed by some manner, permitted by this any later version published by the Free Software Foundation. If the
License, of making, using, or selling its contributor version, but do not Program does not specify a version number of the GNU General Public
include claims that would be infringed only as a consequence of further License, you may choose any version ever published by the Free
modification of the contributor version. For purposes of this definition, Software Foundation.
“control” includes the right to grant patent sublicenses in a manner
consistent with the requirements of this License. If the Program specifies that a proxy can decide which future versions of
the GNU General Public License can be used, that proxy’s public
Each contributor grants you a non-exclusive, worldwide, royalty-free statement of acceptance of a version permanently authorizes you to
patent license under the contributor’s essential patent claims, to make, choose that version for the Program.
use, sell, offer for sale, import and otherwise run, modify and propagate
the contents of its contributor version. Later license versions may give you additional or different permissions.
However, no additional obligations are imposed on any author or
copyright holder as a result of your choosing to follow a later version.
15. Disclaimer of Warranty. Finally, software patents pose a constant threat to the existence of any
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT free program. We wish to make sure that a company cannot effectively
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE restrict the users of a free program by obtaining a restrictive license from
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER a patent holder. Therefore, we insist that any patent license obtained for
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY a version of the library must be consistent with the full freedom of use
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT specified in this license.
NOT LIMITED TO, THE IMPLIED WARRANTIES OF Most GNU software, including some libraries, is covered by the ordinary
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. GNU General Public License. This license, the GNU Lesser General
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF Public License, applies to certain designated libraries, and is quite
THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE different from the ordinary General Public License. We use this license
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY for certain libraries in order to permit linking those libraries into non-free
SERVICING, REPAIR OR CORRECTION. programs.
When a program is linked with a library, whether statically or using a
16. Limitation of Liability. shared library, the combination of the two is legally speaking a
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR combined work, a derivative of the original library. The ordinary General
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY Public License therefore permits such linking only if the entire
OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM combination fits its criteria of freedom. The Lesser General Public
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, License permits more lax criteria for linking other code with the library.
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR We call this license the “Lesser” General Public License because it does
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR Less to protect the user’s freedom than the ordinary General Public
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED License. It also provides other free software developers Less of an
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR advantage over competing non-free programs. These disadvantages
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF are the reason we use the ordinary General Public License for many
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN libraries. However, the Lesser license provides advantages in certain
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE special circumstances.
POSSIBILITY OF SUCH DAMAGES.
For example, on rare occasions, there may be a special need to
encourage the widest possible use of a certain library, so that it
17. Interpretation of Sections 15 and 16. becomes a de-facto standard. To achieve this, non-free programs must
If the disclaimer of warranty and limitation of liability provided above be allowed to use the library. A more frequent case is that a free library
cannot be given local legal effect according to their terms, reviewing does the same job as widely used non-free libraries. In this case, there
courts shall apply local law that most closely approximates an absolute is little to gain by limiting the free library to free software only, so we use
waiver of all civil liability in connection with the Program, unless a the Lesser General Public License.
warranty or assumption of liability accompanies a copy of the Program In other cases, permission to use a particular library in non-free
in return for a fee. programs enables a greater number of people to use a large body of
END OF TERMS AND CONDITIONS free software. For example, permission to use the GNU C Library in
non-free programs enables many more people to use the whole GNU
GNU LESSER GENERAL PUBLIC LICENSE operating system, as well as its variant, the GNU/Linux operating
system.
Version 2.1, February 1999 Although the Lesser General Public License is Less protective of the
Copyright (C) 1991, 1999 Free Software Foundation, Inc. users’ freedom, it does ensure that the user of a program that is linked
with the Library has the freedom and the wherewithal to run that
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA program using a modified version of the Library.
Everyone is permitted to copy and distribute verbatim copies of this The precise terms and conditions for copying, distribution and
license document, but changing it is not allowed. modification follow. Pay close attention to the difference between a
“work based on the library” and a “work that uses the library”. The
[This is the first released version of the Lesser GPL. former contains code derived from the library, whereas the latter must
It also counts as the successor of the GNU Library Public License, be combined with the library in order to run.
version 2, hence the version number 2.1.]
TERMS AND CONDITIONS FOR COPYING,
Preamble DISTRIBUTION AND MODIFICATION
The licenses for most software are designed to take away your freedom
to share and change it. By contrast, the GNU General Public Licenses 0. This License Agreement applies to any software library or other
are intended to guarantee your freedom to share and change free program which contains a notice placed by the copyright holder or
software to make sure the software is free for all its users. other authorized party saying it may be distributed under the terms of
this Lesser General Public License (also called “this License”). Each
This license, the Lesser General Public License, applies to some licensee is addressed as “you”.
specially designated software packages--typically libraries--of the Free
Software Foundation and other authors who decide to use it. You can A “library” means a collection of software functions and/or data
use it too, but we suggest you first think carefully about whether this prepared so as to be conveniently linked with application programs
license or the ordinary General Public License is the better strategy to (which use some of those functions and data) to form executables.
use in any particular case, based on the explanations below. The “Library”, below, refers to any such software library or work which
When we speak of free software, we are referring to freedom of use, not has been distributed under these terms. A “work based on the Library”
price. Our General Public Licenses are designed to make sure that you means either the Library or any derivative work under copyright law: that
have the freedom to distribute copies of free software (and charge for is to say, a work containing the Library or a portion of it, either verbatim
this service if you wish); that you receive source code or can get it if you or with modifications and/or translated straightforwardly into another
want it; that you can change the software and use pieces of it in new language. (Hereinafter, translation is included without limitation in the
free programs; and that you are informed that you can do these things. term “modification”.)
To protect your rights, we need to make restrictions that forbid “Source code” for a work means the preferred form of the work for
distributors to deny you these rights or to ask you to surrender these making modifications to it. For a library, complete source code means
rights. These restrictions translate to certain responsibilities for you if you all the source code for all modules it contains, plus any associated
distribute copies of the library or if you modify it. interface definition files, plus the scripts used to control compilation and
installation of the library.
For example, if you distribute copies of the library, whether gratis or for a
fee, you must give the recipients all the rights that we gave you. You Activities other than copying, distribution and modification are not
must make sure that they, too, receive or can get the source code. If covered by this License; they are outside its scope. The act of running a
you link other code with the library, you must provide complete object program using the Library is not restricted, and output from such a
files to the recipients, so that they can relink them with the library after program is covered only if its contents constitute a work based on the
making changes to the library and recompiling it. And you must show Library (independent of the use of the Library in a tool for writing it).
them these terms so they know their rights. Whether that is true depends on what the Library does and what the
program that uses the Library does.
We protect your rights with a two-step method: (1) we copyright the
library, and (2) we offer you this license, which gives you legal 1. You may copy and distribute verbatim copies of the Library’s
permission to copy, distribute and/or modify the library. complete source code as you receive it, in any medium, provided that
To protect each distributor, we want to make it very clear that there is no you conspicuously and appropriately publish on each copy an
warranty for the free library. Also, if the library is modified by someone appropriate copyright notice and disclaimer of warranty; keep intact all
else and passed on, the recipients should know that what they have is the notices that refer to this License and to the absence of any
not the original version, so that the original author’s reputation will not be warranty; and distribute a copy of this License along with the Library.
affected by problems that might be introduced by others. You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of containing this object code plus portions of the Library will still fall under
it, thus forming a work based on the Library, and copy and distribute Section 6.)
such modifications or work under the terms of Section 1 above, Otherwise, if the work is a derivative of the Library, you may distribute
provided that you also meet all of these conditions: the object code for the work under the terms of Section 6. Any
a) The modified work must itself be a software library. executables containing that work also fall under Section 6, whether or
b) You must cause the files modified to carry prominent notices not they are linked directly with the Library itself.
stating that you changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge 6. As an exception to the Sections above, you may also combine or link
to all third parties under the terms of this License. a “work that uses the Library” with the Library to produce a work
containing portions of the Library, and distribute that work under terms
d) If a facility in the modified Library refers to a function or a table of of your choice, provided that the terms permit modification of the work
data to be supplied by an application program that uses the for the customer’s own use and reverse engineering for debugging such
facility, other than as an argument passed when the facility is modifications.
invoked, then you must make a good faith effort to ensure that, in
the event an application does not supply such function or table, You must give prominent notice with each copy of the work that the
the facility still operates, and performs whatever part of its purpose Library is used in it and that the Library and its use are covered by this
remains meaningful. License. You must supply a copy of this License. If the work during
execution displays copyright notices, you must include the copyright
(For example, a function in a library to compute square roots has a notice for the Library among them, as well as a reference directing the
purpose that is entirely well-defined independent of the application. user to the copy of this License. Also, you must do one of these things:
Therefore, Subsection 2d requires that any application-supplied function a) Accompany the work with the complete corresponding machine-
or table used by this function must be optional: if the application does readable source code for the Library including whatever changes
not supply it, the square root function must still compute square roots.) were used in the work (which must be distributed under Sections
These requirements apply to the modified work as a whole. If identifiable 1 and 2 above); and, if the work is an executable linked with the
sections of that work are not derived from the Library, and can be Library, with the complete machine readable “work that uses the
reasonably considered independent and separate works in themselves, Library”, as object code and/or source code, so that the user can
then this License, and its terms, do not apply to those sections when modify the Library and then relink to produce a modified
you distribute them as separate works. But when you distribute the executable containing the modified Library. (It is understood that
same sections as part of a whole which is a work based on the Library, the user who changes the contents of definitions files in the Library
the distribution of the whole must be on the terms of this License, will not necessarily be able to recompile the application to use the
whose permissions for other licensees extend to the entire whole, and modified definitions.)
thus to each and every part regardless of who wrote it. b) Use a suitable shared library mechanism for linking with the Library.
Thus, it is not the intent of this section to claim rights or contest your A suitable mechanism is one that (1) uses at run time a copy of the
rights to work written entirely by you; rather, the intent is to exercise the library already present on the user’s computer system, rather than
right to control the distribution of derivative or collective works based on copying library functions into the executable, and (2) will operate
the Library. properly with a modified version of the library, if the user installs
one, as long as the modified version is interface-compatible with
In addition, mere aggregation of another work not based on the Library the version that the work was made with.
with the Library (or with a work based on the Library) on a volume of a
storage or distribution medium does not bring the other work under the c) Accompany the work with a written offer, valid for at least three
scope of this License. years, to give the same user the materials specified in Subsection
6a, above, for a charge no more than the cost of performing this
3. You may opt to apply the terms of the ordinary GNU General Public distribution.
License instead of this License to a given copy of the Library. To do this, d) If distribution of the work is made by offering access to copy from
you must alter all the notices that refer to this License, so that they refer a designated place, offer equivalent access to copy the above
to the ordinary GNU General Public License, version 2, instead of to this specified materials from the same place.
License. (If a newer version than version 2 of the ordinary GNU General e) Verify that the user has already received a copy of these materials
Public License has appeared, then you can specify that version instead or that you have already sent this user a copy.
if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, For an executable, the required form of the “work that uses the Library”
so the ordinary GNU General Public License applies to all subsequent must include any data and utility programs needed for reproducing the
copies and derivative works made from that copy. executable from it. However, as a special exception, the materials to be
distributed need not include anything that is normally distributed (in
This option is useful when you wish to copy part of the code of the either source or binary form) with the major components (compiler,
Library into a program that is not a library. kernel, and so on) of the operating system on which the executable
runs, unless that component itself accompanies the executable.
4. You may copy and distribute the Library (or a portion or derivative of It may happen that this requirement contradicts the license restrictions
it, under Section 2) in object code or executable form under the terms of other proprietary libraries that do not normally accompany the
of Sections 1 and 2 above provided that you accompany it with the operating system. Such a contradiction means you cannot use both
complete corresponding machine-readable source code, which must them and the Library together in an executable that you distribute.
be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange.
7. You may place library facilities that are a work based on the Library
If distribution of object code is made by offering access to copy from a side-by-side in a single library together with other library facilities not
designated place, then offering equivalent access to copy the source covered by this License, and distribute such a combined library,
code from the same place satisfies the requirement to distribute the provided that the separate distribution of the work based on the Library
source code, even though third parties are not compelled to copy the and of the other library facilities is otherwise permitted, and provided
source along with the object code. that you do these two things:
a) Accompany the combined library with a copy of the same work
5. A program that contains no derivative of any portion of the Library, based on the Library, uncombined with any other library facilities.
but is designed to work with the Library by being compiled or linked This must be distributed under the terms of the Sections above.
with it, is called a “work that uses the Library”. Such a work, in isolation,
is not a derivative work of the Library, and therefore falls outside the b) Give prominent notice with the combined library of the fact that part
scope of this License. of it is a work based on the Library, and explaining where to find the
accompanying uncombined form of the same work.
However, linking a “work that uses the Library” with the Library creates
an executable that is a derivative of the Library (because it contains 8. You may not copy, modify, sublicense, link with, or distribute the
portions of the Library), rather than a “work that uses the library”. The Library except as expressly provided under this License. Any attempt
executable is therefore covered by this License. Section 6 states terms otherwise to copy, modify, sublicense, link with, or distribute the Library
for distribution of such executables. is void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under
When a “work that uses the Library” uses material from a header file this License will not have their licenses terminated so long as such
that is part of the Library, the object code for the work may be a parties remain in full compliance.
derivative work of the Library even though the source code is not.
Whether this is true is especially significant if the work can be linked 9. You are not required to accept this License, since you have not signed
without the Library, or if the work is itself a library. The threshold for this it. However, nothing else grants you permission to modify or distribute
to be true is not precisely defined by law. the Library or its derivative works. These actions are prohibited by law if
you do not accept this License. Therefore, by modifying or distributing
If such an object file uses only numerical parameters, data structure the Library (or any work based on the Library), you indicate your
layouts and accessors, and small macros and small inline functions (ten acceptance of this License to do so, and all its terms and conditions for
lines or less in length), then the use of the object file is unrestricted, copying, distributing or modifying the Library or works based on it.
regardless of whether it is legally a derivative work. (Executables
10. Each time you redistribute the Library (or any work based on the How to Apply These Terms to Your New Libraries
Library), the recipient automatically receives a license from the original
licensor to copy, distribute, link with or modify the Library subject to If you develop a new library, and you want it to be of the greatest
these terms and conditions. You may not impose any further restrictions possible use to the public, we recommend making it free software that
on the recipients’ exercise of the rights granted herein. You are not everyone can redistribute and change. You can do so by permitting
responsible for enforcing compliance by third parties with this License. redistribution under these terms (or, alternatively, under the terms of the
11. If, as a consequence of a court judgment or allegation of patent ordinary General Public License).
infringement or for any other reason (not limited to patent issues), To apply these terms, attach the following notices to the library. It is
conditions are imposed on you (whether by court order, agreement or safest to attach them to the start of each source file to most effectively
otherwise) that contradict the conditions of this License, they do not convey the exclusion of warranty; and each file should have at least the
excuse you from the conditions of this License. If you cannot distribute “copyright” line and a pointer to where the full notice is found. one line
so as to satisfy simultaneously your obligations under this License and to give the library’s name and an idea of what it does.
any other pertinent obligations, then as a consequence you may not Copyright (C) year name of author
distribute the Library at all. For example, if a patent license would not
permit royalty free redistribution of the Library by all those who receive This library is free software; you can redistribute it and/or modify it under
copies directly or indirectly through you, then the only way you could the terms of the GNU Lesser General Public License as published by
satisfy both it and this License would be to refrain entirely from the Free Software Foundation; either version 2.1 of the License, or (at
distribution of the Library. your option) any later version.
If any portion of this section is held invalid or unenforceable under any This library is distributed in the hope that it will be useful, but WITHOUT
particular circumstance, the balance of the section is intended to apply, and ANY WARRANTY; without even the implied warranty of
the section as a whole is intended to apply in other circumstances. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
the GNU Lesser General Public License for more details.
It is not the purpose of this section to induce you to infringe any patents or
other property right claims or to contest validity of any such claims; this You should have received a copy of the GNU Lesser General Public
section has the sole purpose of protecting the integrity of the free software License along with this library; if not, write to the Free Software
distribution system which is implemented by public license practices. Many Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-
people have made generous contributions to the wide range of software 1301 USA Also add information on how to contact you by electronic
distributed through that system in reliance on consistent application of that and paper mail.
system; it is up to the author/donor to decide if he or she is willing to You should also get your employer (if you work as a programmer) or
distribute software through any other system and a licensee cannot impose your school, if any, to sign a “copyright disclaimer” for the library, if
that choice. necessary. Here is a sample; alter the names:
This section is intended to make thoroughly clear what is believed to be Yoyodyne, Inc., hereby disclaims all copyright interest in the library
a consequence of the rest of this License. ‘Frob’ (a library for tweaking knobs) written by James Random Hacker.
12. If the distribution and/or use of the Library is restricted in certain signature of Ty Coon, 1 April 1990 Ty Coon, President of Vice.
countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Library under this License may add an
explicit geographical distribution limitation excluding those countries, so OpenSSL LICENSE
that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
written in the body of this License. Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
13. The Free Software Foundation may publish revised and/or new
versions of the Lesser General Public License from time to time. Such 1. Redistributions of source code must retain the above copyright
new versions will be similar in spirit to the present version, but may differ notice, this list of conditions and the following disclaimer.
in detail to address new problems or concerns. 2. Redistributions in binary form must reproduce the above copyright
Each version is given a distinguishing version number. If the Library notice, this list of conditions and the following disclaimer in the
specifies a version number of this License which applies to it and “any documentation and/or other materials provided with the distribution.
later version”, you have the option of following the terms and conditions 3. All advertising materials mentioning features or use of this software
either of that version or of any later version published by the Free must display the following acknowledgment: “This product includes
Software Foundation. If the Library does not specify a license version software developed by the OpenSSL Project for use in the OpenSSL
number, you may choose any version ever published by the Free Toolkit. (http://www.openssl.org/)”
Software Foundation. 4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be
14. If you wish to incorporate parts of the Library into other free used to endorse or promote products derived from this software
programs whose distribution conditions are incompatible with these, without prior written permission. For written permission, please contact
write to the author to ask for permission. For software which is [email protected].
copyrighted by the Free Software Foundation, write to the Free 5. Products derived from this software may not be called “OpenSSL”
Software Foundation; we sometimes make exceptions for this. Our nor may “OpenSSL” appear in their names without prior written
decision will be guided by the two goals of preserving the free status of permission of the OpenSSL Project.
all derivatives of our free software and of promoting the sharing and
reuse of software generally. 6. Redistributions of any form whatsoever must retain the following
acknowledgment: “This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.
NO WARRANTY org/)”
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ‘‘AS IS’’
IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED AND ANY EXPRESSED OR
BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE DAMAGE.This product includes cryptographic software written by Eric
LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR Young ([email protected]). This product includes software written by
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR Tim Hudson ([email protected]).
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR Original SSLeay License
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF Copyright (C) 1995-1998 Eric Young ([email protected]) All rights
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE reserved. This package is an SSL implementation written by Eric Young
POSSIBILITY OF SUCH DAMAGES. ([email protected]). The implementation was written so as to conform
with Netscapes SSL. This library is free for commercial and non-
commercial use as long as the following conditions are aheared to. The
END OF TERMS AND CONDITIONS following conditions apply to all code found in this distribution, be it the
RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL
documentation included with this distribution is covered by the same 1.3. “Covered Software” means (a) the Original Software, or (b)
copyright terms except that the holder is Tim Hudson (tjh@cryptsoft. Modifications, or (c) the combination of files containing Original Software
com). with files containing Modifications, in each case including portions
Copyright remains Eric Young’s, and as such any Copyright notices in thereof.
the code are not to be removed. 1.4. “Executable” means the Covered Software in any form other than
If this package is used in a product, Eric Young should be given Source Code.
attribution as the author of the parts of the library used. This can be in
the form of a textual message at program startup or in documentation 1.5. “Initial Developer” means the individual or entity that first makes
(online or textual) provided with the package.Redistribution and use in Original Software available under this License.
source and binary forms, with or without modification, are permitted
provided that the following conditions are met: 1.6. “Larger Work” means a work which combines Covered Software or
1. Redistributions of source code must retain the copyright notice, this portions thereof with code not governed by the terms of this License.
list of conditions and the following disclaimer. 1.7. “License” means this document.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the 1.8. “Licensable” means having the right to grant, to the maximum
documentation and/or other materials provided with the distribution. 3. extent possible, whether at the time of the initial grant or subsequently
All advertising materials mentioning features or use of this software must acquired, any and all of the rights conveyed herein.
display the following acknowledgement: “This product includes
cryptographic software written by Eric Young ([email protected])” The 1.9. “Modifications” means the Source Code and Executable form of
word ‘cryptographic’ can be left out if the rouines from the library being any of the following:
used are not cryptographic related :-). A. Any file that results from an addition to, deletion from or
modification of the contents of a file containing Original Software
4. If you include any Windows specific code (or a derivative thereof) from or previous Modifications;
the apps directory (application code) you must include an
acknowledgement: “This product includes software written by Tim B. Any new file that contains any part of the Original Software or
Hudson ([email protected])” previous Modifications; or
C. Any new file that is contributed or otherwise made available under
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ‘‘AS IS’’ AND ANY the terms of this License.
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 1.10. “Original Software” means the Source Code and Executable form
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN of computer software code that is originally released under this License.
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, 1.11. “Patent Claims” means any patent claim(s), now owned or
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED hereafter acquired, including without limitation, method, process, and
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS apparatus claims, in any patent Licensable by grantor.
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER 1.12. “Source Code” means (a) the common form of computer software
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING code in which modifications are made and (b) associated
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE documentation included in or with such code.
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.The licence and distribution terms for any publically 1.13. “You” (or “Your”) means an individual or a legal entity exercising
available version or derivative of this code cannot be changed. i.e. this rights under, and complying with all of the terms of, this License. For
code cannot simply be copied and put under another distribution legal entities, “You” includes any entity which controls, is controlled by,
licence [including the GNU Public Licence. or is under common control with You. For purposes of this definition,
“control” means (a) the power, direct or indirect, to cause the direction
or management of such entity, whether by contract or otherwise, or (b)
Boost Software License ownership of more than fifty percent (50%) of the outstanding shares or
beneficial ownership of such entity.
Boost Software License - Version 1.0 - August 17th, 2003 Permission is
hereby granted, free of charge, to any person or organization obtaining 2. License Grants.
a copy of the software and accompanying documentation covered by
this license (the “Software”) to use, reproduce, display, distribute, 2.1. The Initial Developer Grant.
execute, and transmit the Software, and to prepare derivative works of
the Software, and to permit third-parties to whom the Software is Conditioned upon Your compliance with Section 3.1 below and subject
furnished to do so, all subject to the following : The copyright notices in to third party intellectual property claims, the Initial Developer hereby
the Software and this entire statement, including the above license grants You a world-wide, royalty-free, non-exclusive license:
grant, this restriction and the following disclaimer, must be included in all a) under intellectual property rights (other than patent or trademark)
copies of the Software, in whole or in part, and all derivative works of Licensable by Initial Developer, to use, reproduce, modify, display,
the Software, unless such copies or derivative works are solely in the perform, sublicense and distribute the Original Software (or
form of machine-executable object code generated by a source portions thereof), with or without Modifications, and/or as part of a
language processor. Larger Work; and
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF b) under Patent Claims infringed by the making, using or selling of
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO Original Software, to make, have made, use, practice, sell, and
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A offer for sale, and/or otherwise dispose of the Original Software (or
PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO portions thereof).
EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE c) The licenses granted in Sections 2.1(a) and (b) are effective on the
DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR date Initial Developer first distributes or otherwise makes the
OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, Original Software available to a third party under the terms of this
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE License.
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
d) Notwithstanding Section 2.1(b) above, no patent license is
granted: (1) for code that You delete from the Original Software, or
COMMON DEVELOPMENT AND DISTRIBUTION (2) for infringements caused by: (i) the modification of the Original
LICENSE Version 1.0 Software, or (ii) the combination of the Original Software with other
software or devices.
1. Definitions. 2.2. Contributor Grant.
1.1. “Contributor” means each individual or entity that creates or Conditioned upon Your compliance with Section 3.1 below and subject
contributes to the creation of Modifications. to third party intellectual property claims, each Contributor hereby
grants You a world-wide, royalty-free, non-exclusive license:
1.2. “Contributor Version” means the combination of the Original
Software, prior Modifications used by a Contributor (if any), and the a) under intellectual property rights (other than patent or trademark)
Modifications made by that particular Contributor. Licensable by Contributor to use, reproduce, modify, display,
perform, sublicense and distribute the Modifications created by
such Contributor (or portions thereof), either on an unmodified
basis, with other Modifications, as Covered Software and/or as
part of a Larger Work; and
b) under Patent Claims infringed by the making, using, or selling of version will be given a distinguishing version number. Except as
Modifications made by that Contributor either alone and/or in provided in Section 4.3, no one other than the license steward has the
combination with its Contributor Version (or portions of such right to modify this License.
combination), to make, use, sell, offer for sale, have made, and/or
otherwise dispose of: (1) Modifications made by that Contributor 4.2. Effect of New Versions.
(or portions thereof); and (2) the combination of Modifications
made by that Contributor with its Contributor Version (or portions You may always continue to use, distribute or otherwise make the
of such combination). Covered Software available under the terms of the version of the
License under which You originally received the Covered Software. If the
c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on Initial Developer includes a notice in the Original Software prohibiting it
the date Contributor first distributes or otherwise makes the from being distributed or otherwise made available under any
Modifications available to a third party. subsequent version of the License, You must distribute and make the
d) Notwithstanding Section 2.2(b) above, no patent license is Covered Software available under the terms of the version of the
granted: (1) for any code that Contributor has deleted from the License under which You originally received the Covered Software.
Contributor Version; (2) for infringements caused by: (i) third party Otherwise, You may also choose to use, distribute or otherwise make
modifications of Contributor Version, or (ii) the combination of the Covered Software available under the terms of any subsequent
Modifications made by that Contributor with other software version of the License published by the license steward.
(except as part of the Contributor Version) or other devices; or (3)
under Patent Claims infringed by Covered Software in the absence 4.3. Modified Versions.
of Modifications made by that Contributor. When You are an Initial Developer and You want to create a new license
for Your Original Software, You may create and use a modified version
3. Distribution Obligations. of this License if You: (a) rename the license and remove any references
to the name of the license steward (except to note that the license
3.1. Availability of Source Code. differs from this License); and (b) otherwise make it clear that the license
contains terms which differ from this License.
Any Covered Software that You distribute or otherwise make available in
Executable form must also be made available in Source Code form and
that Source Code form must be distributed only under the terms of this 5. DISCLAIMER OF WARRANTY.
License. You must include a copy of this License with every copy of the COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN
Source Code form of the Covered Software You distribute or otherwise “AS IS” BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER
make available. You must inform recipients of any such Covered EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION,
Software in Executable form as to how they can obtain such Covered WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF
Software in Source Code form in a reasonable manner on or through a DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR
medium customarily used for software exchange. NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND
3.2. Modifications. PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU.
SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY
The Modifications that You create or to which You contribute are RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER
governed by the terms of this License. You represent that You believe CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY
Your Modifications are Your original creation(s) and/or You have SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF
sufficient rights to grant the rights conveyed by this License. WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE.
NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED
3.3. Required Notices. HEREUNDER EXCEPT UNDER THIS DISCLAIMER.
You must include a notice in each of Your Modifications that identifies 6. TERMINATION.
You as the Contributor of the Modification. You may not remove or alter
any copyright, patent or trademark notices contained within the 6.1. This License and the rights granted hereunder will terminate
Covered Software, or any notices of licensing or any descriptive text automatically if You fail to comply with terms herein and fail to cure such
giving attribution to any Contributor or the Initial Developer. breach within 30 days of becoming aware of the breach. Provisions
which, by their nature, must remain in effect beyond the termination of
3.4. Application of Additional Terms. this License shall survive.
You may not offer or impose any terms on any Covered Software in 6.2. If You assert a patent infringement claim (excluding declaratory
Source Code form that alters or restricts the applicable version of this judgment actions) against Initial Developer or a Contributor (the Initial
License or the recipients’ rights hereunder. You may choose to offer, Developer or Contributor against whom You assert such claim is
and to charge a fee for, warranty, support, indemnity or liability referred to as “Participant”) alleging that the Participant Software
obligations to one or more recipients of Covered Software. However, (meaning the Contributor Version where the Participant is a Contributor
you may do so only on Your own behalf, and not on behalf of the Initial or the Original Software where the Participant is the Initial Developer)
Developer or any Contributor. You must make it absolutely clear that any directly or indirectly infringes any patent, then any and all rights granted
such warranty, support, indemnity or liability obligation is offered by You directly or indirectly to You by such Participant, the Initial Developer (if
alone, and You hereby agree to indemnify the Initial Developer and every the Initial Developer is not the Participant) and all Contributors under
Contributor for any liability incurred by the Initial Developer or such Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from
Contributor as a result of warranty, support, indemnity or liability terms Participant terminate prospectively and automatically at the expiration of
You offer. such 60 day notice period, unless if within such 60 day period You
3.5. Distribution of Executable Versions. withdraw Your claim with respect to the Participant Software against
such Participant either unilaterally or pursuant to a written agreement
You may distribute the Executable form of the Covered Software under with Participant.
the terms of this License or under the terms of a license of Your choice,
which may contain terms different from this License, provided that You 6.3. In the event of termination under Sections 6.1 or 6.2 above, all end
are in compliance with the terms of this License and that the license for user licenses that have been validly granted by You or any distributor
the Executable form does not attempt to limit or alter the recipient’s hereunder prior to termination (excluding licenses granted to You by any
rights in the Source Code form from the rights set forth in this License. If distributor) shall survive termination.
You distribute the Covered Software in Executable form under a different
license, You must make it absolutely clear that any terms which differ 7. LIMITATION OF LIABILITY.
from this License are offered by You alone, not by the Initial Developer or
Contributor. You hereby agree to indemnify the Initial Developer and UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
every Contributor for any liability incurred by the Initial Developer or such WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR
Contributor as a result of any such terms You offer. OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER
CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE,
3.6. Larger Works. OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY
PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR
You may create a Larger Work by combining Covered Software with CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
other code not governed by the terms of this License and distribute the WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF
Larger Work as a single product. In such a case, You must make sure GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR
the requirements of this License are fulfilled for the Covered Software. MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES
OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED
4. Versions of the License. OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
4.1. New Versions. PERSONAL INJURY RESULTING FROM SUCH PARTY’S
NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH
Sun Microsystems, Inc. is the initial license steward and may publish LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE
revised and/or new versions of this License from time to time. Each EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL
DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY
TO YOU.
8. U.S. GOVERNMENT END USERS. We specifically permit and encourage the inclusion of this software, with
or without modifications, in commercial products. We disclaim all
The Covered Software is a “commercial item,” as that term is defined in warranties covering The FreeType Project and assume no liability related
48 C.F.R. 2.101 (Oct. 1995), consisting of “commercial computer to The FreeType Project.
software” (as that term is defined at 48 C.F.R. 252.227-7014(a)(1)) and
“commercial computer software documentation” as such terms are Finally, many people asked us for a preferred form for a credit/disclaimer
used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. to use in compliance with this license. We thus encourage you to use
12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all the following text:
U.S. Government End Users acquire Covered Software with only those
rights set forth herein. This U.S. Government Rights clause is in lieu of, “Portions of this software are copyright © 1996-2002 The FreeType
and supersedes, any other FAR, DFAR, or other clause or provision that Project (www.freetype.org). All rights reserved.”
addresses Government rights in computer software under this License.
Legal Terms
9. MISCELLANEOUS.
===========
This License represents the complete agreement concerning subject
matter hereof. If any provision of this License is held to be
unenforceable, such provision shall be reformed only to the extent 1. Definitions
necessary to make it enforceable. This License shall be governed by the --------------
law of the jurisdiction specified in a notice contained within the Original
Software (except to the extent applicable law, if any, provides Throughout this license, the terms `package’, `FreeType Project’, and
otherwise), excluding such jurisdiction’s conflict-of-law provisions. Any `FreeType archive’ refer to the set of files originally distributed by the
litigation relating to this License shall be subject to the jurisdiction of the authors (David Turner, Robert Wilhelm, and Werner Lemberg) as the
courts located in the jurisdiction and venue specified in a notice `FreeType Project’, be they named as alpha, beta or final release.
contained within the Original Software, with the losing party responsible
for costs, including, without limitation, court costs and reasonable `You’ refers to the licensee, or person using the project, where `using’ is
attorneys’ fees and expenses. The application of the United Nations a generic term including compiling the project’s source code as well as
Convention on Contracts for the International Sale of Goods is expressly linking it to form a `program’ or `executable’. This program is referred to
excluded. Any law or regulation which provides that the language of a as `a program using the FreeType engine’.
contract shall be construed against the drafter shall not apply to this
License. You agree that You alone are responsible for compliance with This license applies to all files distributed in the original FreeType Project,
the United States export administration regulations (and the export including all source code, binaries and documentation, unless otherwise
control laws and regulation of any other countries) when You use, stated in the file in its original, unmodified form as distributed in the
distribute or otherwise make available any Covered Software. original archive. If you are unsure whether or not a particular file is
covered by this license, you must contact us to verify this.
10. RESPONSIBILITY FOR CLAIMS. The FreeType Project is copyright (C) 1996-2000 by David Turner,
As between Initial Developer and the Contributors, each party is Robert Wilhelm, and Werner Lemberg. All rights reserved except as
responsible for claims and damages arising, directly or indirectly, out of specified below.
its utilization of rights under this License and You agree to work with
Initial Developer and Contributors to distribute such responsibility on an 2. No Warranty
equitable basis. Nothing herein is intended or shall be deemed to
constitute any admission of liability. --------------
Discusses bugs, as well as engine internals, design issues, specific Permission is hereby granted, free of charge, to any person obtaining a
licenses, porting, etc. copy of this software and associated documentation files (the
“Software”), to deal in the Software without restriction, including without
o http://www.freetype.org limitation the rights to use, copy, modify, merge, publish, distribute,
sublicense, and/or sell copies of the Software, and to permit persons to
Holds the current FreeType web page, which will allow you to download whom the Software is furnished to do so, subject to the following
our latest development version and read online documentation. conditions:
You can also contact us individually at: David Turner {david.turner@ The above copyright notice and this permission notice shall be included
freetype.org} Robert Wilhelm {[email protected]} Werner in all copies or substantial portions of the Software.
Lemberg {[email protected]}
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
RSA MD4 or MD5 Message-Digest Algorithm THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
License PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
reserved. ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
License to copy and use this software is granted provided that it is OR OTHER DEALINGS IN THE SOFTWARE.
identified as the “RSA Data Security, Inc. MD5 Message-Digest
Algorithm” in all material mentioning or referencing this software or this
function.
Some software components of this product incorporate source code covered under the BSD license as follows.
lighttpd is a secure, fast, compliant, and very flexible webserver that has been optimized for high-performance environments. It has a very low
memory footprint compared to other webservers and takes care of cpuload.
Its advanced feature-set (FastCGI, CGI, Auth, Output-Compression, • Neither the name of the ‘incremental’ nor the names of its
URL-Rewriting and many more) make lighttpd the perfect webserver- contributors may be used to endorse or promote products derived
software for every server that suffers load problems. from this software without specific prior written permission.
For more additional information, send email to [email protected]. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
Copyright (c) 2004, Kneschke, incremental WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
All rights reserved. PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
Redistribution and use in source and binary forms, with or without DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
modification, are permitted provided that the following conditions are CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
met : PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
• Redistributions of source code must retain the above copyright USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
notice, this list of conditions and the following disclaimer. CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
• Redistributions in binary form must reproduce the above copyright CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
notice, this list of conditions and the following disclaimer in the OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
documentation and/or other materials provided with the distribution. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Component Name License License URL
For more additional information, send email to [email protected]. 4. Neither the name of the University nor of the Department may be
used to endorse or promote products derived from this software
Copyright (c) 1998-2000 University College London without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND
All rights reserved. CONTRIBUTORS “AS IS” AND ANY EXPRESSED OR IMPLIED
Redistribution and use in source and binary forms, with or without WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
modification, is permitted provided that the following conditions are met: WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
1. Redistributions of source code must retain the above copyright THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
notice, this list of conditions and the following disclaimer. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
2. Redistributions in binary form must reproduce the above copyright CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
notice, this list of conditions and the following disclaimer in the PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
documentation and/or other materials provided with the distribution. USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
3. All advertising materials mentioning features or use of this software CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
must display the following acknowledgement: This product includes CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
software developed by the Computer Science Department at OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
University College London SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Simple Network Management Protocol (SNMP) is an Internetstandard 3. Neither the name of the Networks Associates Technology, Inc nor the
protocol for managing devices on IP networks. It is used mostly in names of its contributors may be used to endorse or promote
network management systems to monitor the devices attached to the products derived from this software without specific prior written
network for conditions that need administrative attention. Net-SNMP is a permission.
suite of applications used to implement SNMP v1, SNMP v2c and THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
SNMP v3 using both IPv4 and IPv6. CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
For more additional information, send email to [email protected]. WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
Various copyrights apply to this package, listed in various separate parts WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
below. Please make sure that you read all the parts. PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
Part 1: CMU/UCD copyright notice: (BSD like) CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
Copyright 1989, 1991, 1992 by Carnegie Mellon University USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
Derivative Work - 1996, 1998-2000 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
Copyright 1996, 1998-2000 The Regents of the University of California CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
All Rights Reserved SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
Permission to use, copy, modify and distribute this software and its DAMAGE.
documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appears in all copies and that Part 3: Cambridge Broadband Ltd. copyright notice
both that copyright notice and this permission notice appear in
supporting documentation, and that the name of CMU and The (BSD)
Regents of the University of California not be used in advertising or Portions of this code are copyright (c) 2001-2003, Cambridge
publicity pertaining to distribution of the software without specific written Broadband Ltd.
permission.
All rights reserved.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA
DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, Redistribution and use in source and binary forms, with or without
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND modification, are permitted provided that the following conditions are
FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE met:
UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, 1. Redistributions of source code must retain the above copyright
INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES notice, this list of conditions and the following disclaimer.
WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 2. Redistributions in binary form must reproduce the above copyright
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN notice, this list of conditions and the following disclaimer in the
CONNECTION WITH THE USE OR PERFORMANCE OF THIS documentation and/or other materials provided with the distribution.
SOFTWARE. 3. The name of Cambridge Broadband Ltd. may not be used to
endorse or promote products derived from this software without
Part 2: Networks Associates Technology, Inc specific prior written permission.
copyright notice (BSD) THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS
IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
Copyright (c) 2001-2003, Networks Associates Technology, Inc NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
All rights reserved. ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER
Redistribution and use in source and binary forms, with or without BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
modification, are permitted provided that the following conditions are EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
met: NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
1. Redistributions of source code must retain the above copyright SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
notice, this list of conditions and the following disclaimer. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2. Redistributions in binary form must reproduce the above copyright (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
notice, this list of conditions and the following disclaimer in the OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
documentation and/or other materials provided with the distribution. POSSIBILITY OF SUCH DAMAGE.
For more additional information, send email to [email protected]. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
Copyright (c) 2005-2009, Thomas BERNARD WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
All rights reserved. PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
Redistribution and use in source and binary forms, with or without DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
modification, are permitted provided that the following conditions are CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
met: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
1. Redistributions of source code must retain the above copyright USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
notice, this list of conditions and the following disclaimer. CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
2. Redistributions in binary form must reproduce the above copyright OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
notice, this list of conditions and the following disclaimer in the SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
documentation and/or other materials provided with the distribution. DAMAGE.
3. The name of the author may not be used to endorse or promote
products derived from this software without specific prior written
permission.
For more additional information, send email to [email protected]. 1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
Copyright (c) 2003 Paul Mackerras. 2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
All rights reserved. documentation and/or other materials provided with the distribution.
Redistribution and use in source and binary forms, with or without 3. The names of the authors of this software must not be used to
modification, are permitted provided that the following conditions are endorse or promote products derived from this software without prior
met: written permission.
1. Redistributions of source code must retain the above copyright 4. Redistributions of any form whatsoever must retain the following
notice, this list of conditions and the following disclaimer. acknowledgment: “This product includes software developed by
2. The name(s) of the authors of this software must not be used to Pedro Roque Marques <[email protected]>”
endorse or promote products derived from this software without prior THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
written permission. WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
3. Redistributions of any form whatsoever must retain the following WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
acknowledgment: “This product includes software developed by Paul SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
Mackerras <[email protected]>”. CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT PERFORMANCE OF THIS SOFTWARE.
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN Copyright (c) 1995 Eric Rosenquist.
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR All rights reserved.
PERFORMANCE OF THIS SOFTWARE. Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
Copyright (c) 1995 Pedro Roque Marques. met:
1. Redistributions of source code must retain the above copyright notice,
All rights reserved. this list of conditions and the following disclaimer.
Redistribution and use in source and binary forms, with or without 2. Redistributions in binary form must reproduce the above copyright
modification, are permitted provided that the following conditions are notice, this list of conditions and the following disclaimer in the
met: documentation and/or other materials provided with the distribution.
3. The name(s) of the authors of this software must not be used to
endorse or promote products derived from this software without prior
written permission.
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES Copyright (c) 1999 Tommi Komulainen.
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT All rights reserved.
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR Redistribution and use in source and binary forms, with or without
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER modification, are permitted provided that the following conditions are
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN met:
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 1. Redistributions of source code must retain the above copyright notice,
PERFORMANCE OF THIS SOFTWARE. this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
Copyright (c) 2002 Google, Inc. notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
All rights reserved. 3. The name(s) of the authors of this software must not be used to
Redistribution and use in source and binary forms, with or without endorse or promote products derived from this software without prior
modification, are permitted provided that the following conditions are written permission.
met: 4. Redistributions of any form whatsoever must retain the following
1. Redistributions of source code must retain the above copyright notice, acknowledgment: “This product includes software developed by
this list of conditions and the following disclaimer. Tommi Komulainen <[email protected]>”.
2. Redistributions in binary form must reproduce the above copyright THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
notice, this list of conditions and the following disclaimer in the WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
documentation and/or other materials provided with the distribution. WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
3. The name(s) of the authors of this software must not be used to SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
endorse or promote products derived from this software without prior CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
written permission. RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED PERFORMANCE OF THIS SOFTWARE.
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER Copyright (c) 1984-2000 Carnegie Mellon University.
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN All rights reserved.
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR Redistribution and use in source and binary forms, with or without
PERFORMANCE OF THIS SOFTWARE. modification, are permitted provided that the following conditions are
met:
Copyright (c) 2001 by Sun Microsystems, Inc. 1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
All rights reserved. 2. Redistributions in binary form must reproduce the above copyright
Non-exclusive rights to redistribute, modify, translate, and use this notice, this list of conditions and the following disclaimer in the
software in source and binary forms, in whole or in part, is hereby documentation and/or other materials provided with the distribution.
granted, provided that the above copyright notice is duplicated in any 3. The name “Carnegie Mellon University” must not be used to endorse
source form, and that neither the name of the copyright holder nor the or promote products derived from this software without prior written
author is used to endorse or promote products derived from this permission. For permission or any legal details, please contact Office
software. of Technology Transfer Carnegie Mellon University 5000 Forbes
THIS SOFTWARE IS PROVIDED ``AS IS’’ AND WITHOUT ANY EXPRESS Avenue Pittsburgh, PA 15213-3890 (412) 268-4387, fax: (412)
OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE 268-7395 [email protected]
IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A 4. Redistributions of any form whatsoever must retain the following
PARTICULAR PURPOSE. acknowledgment: “This product includes software developed by
Computing Services at Carnegie Mellon University (http://www.cmu.
edu/computing/).”
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA
OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
Copyright (c) 2008 Mark Lord THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
All rights reserved. WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
Redistribution and use in source and binary forms, with or without WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
modification, are permitted provided that the following conditions are PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
met: COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
1. Redistributions of source code must retain the above copyright CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
notice, this list of conditions and the following disclaimer. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
2. Redistributions in binary form must reproduce the above copyright USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
notice, this list of conditions and the following disclaimer in the CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
documentation and/or other materials provided with the distribution. CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
3. Neither the name of the copyright holder nor the names of its SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
contributors may be used to endorse or promote products derived DAMAGE.
from this software without specific prior written permission.
Samsung cares for the environment at all product manufacturing stages, and is taking measures to provide customers with more
environmentally friendly products.
The Eco mark represents Samsung’s devotion to creating environmentally friendly products, and indicates that the product satisfies the
EU RoHS Directive.
This marking on the battery, manual or packaging indicates that the batteries in this product should not be disposed of with other household waste at the end of their
working life. Where marked, the chemical symbols Hg, Cd or Pb indicate that the battery contains mercury, cadmium or lead above the reference levels in EC Directive
2006/66. If batteries are not properly disposed of, these substances can cause harm to human health or the environment.
To protect natural resources and to promote material reuse, please separate batteries from other types of waste and recycle them through your local, free battery
return system.
SALES NETWORK
HEAD OFFICE
6, Pangyo-ro 319beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do, 463-400 Rep. of KOREA
Tel : +82-70-7147-8753, 8764 Fax : +82-31-8018-3740
www.samsungsecurity.com