background image

29

Appendix E

Software End User License Agreement

RangePlus Wireless USB Network Adapter

b)  Use a suitable shared library mechanism for linking 

with the Library. A suitable mechanism is one that 
(1)  uses  at  run  time  a  copy  of  the  library  already 
present on the user’s computer system, rather than 
copying library functions into the executable, and 
(2) will operate properly with a modified version of 
the  library,  if  the  user  installs  one,  as  long  as  the 
modified version is interface-compatible with the 
version that the work was made with.

c)  Accompany  the  work  with  a  written  offer,  valid 

for at least three years, to give the same user the 
materials  specified  in  Subsection  6a,  above,  for  a 
charge  no  more  than  the  cost  of  performing  this 
distribution.

d)  If distribution of the work is made by offering access 

to copy from a designated place, offer equivalent 
access to copy the above specified materials from 
the same place.

e)  Verify that the user has already received a copy of 

these materials or that you have already sent this 
user a copy.

For an executable, the required form of the “work that 
uses  the  Library”  must  include  any  data  and  utility 
programs needed for reproducing the executable from 
it. However, as a special exception, the materials to be 
distributed need not include anything that is normally 
distributed (in either source or binary form) with the 
major components (compiler, kernel, and so on) of the 
operating system on which the executable runs, unless 
that component itself accompanies the executable.

It  may  happen  that  this  requirement  contradicts  the 
license  restrictions  of  other  proprietary  libraries  that 
do  not  normally  accompany  the  operating  system. 
Such  a  contradiction  means  you  cannot  use  both 
them  and  the  Library  together  in  an  executable  that 
you distribute.

7.  You may place library facilities that are a work based 

on the Library side-by-side in a single library together 
with other library facilities not covered by this License, 
and distribute such a combined library, provided that 
the  separate  distribution  of  the  work  based  on  the 
Library  and  of  the  other  library  facilities  is  otherwise 
permitted,  and  provided  that  you  do  these  two 
things:
a)  Accompany the combined library with a copy of the 

same work based on the Library, uncombined with 
any other library facilities. This must be distributed 
under the terms of the Sections above.

b)  Give prominent notice with the combined library of 

the fact that part of it is a work based on the Library, 
and  explaining  where  to  find  the  accompanying 
uncombined form of the same work.

8.  You  may  not  copy,  modify,  sublicense,  link  with,  or 

distribute  the  Library  except  as  expressly  provided 
under  this  License.  Any  attempt  otherwise  to  copy, 
modify, sublicense, link with, or distribute the Library 
is  void,  and  will  automatically  terminate  your  rights 
under this License. However, parties who have received 
copies, or rights, from you under this License will not 
have their licenses terminated so long as such parties 
remain in full compliance.

9.  You are not required to accept this License, since you 

have not signed it. However, nothing else grants you 
permission  to  modify  or  distribute  the  Library  or  its 
derivative works. These actions are prohibited by law if 
you do not accept this License. Therefore, by modifying 
or distributing the Library (or any work based on the 
Library), you indicate your acceptance of this License 
to do so, and all its terms and conditions for copying, 
distributing or modifying the Library or works based 
on it.

10. Each  time  you  redistribute  the  Library  (or  any  work 

based  on  the  Library),  the  recipient  automatically 
receives  a  license  from  the  original  licensor  to  copy, 
distribute,  link  with  or  modify  the  Library  subject 
to  these  terms  and  conditions. You  may  not  impose 
any  further  restrictions  on  the  recipients’  exercise  of 
the  rights  granted  herein.  You  are  not  responsible 
for  enforcing  compliance  by  third  parties  with  this 
License.

11. If, as a consequence of a court judgment or allegation 

of  patent  infringement  or  for  any  other  reason  (not 
limited  to  patent  issues),  conditions  are  imposed  on 
you (whether by court order, agreement or otherwise) 
that contradict the conditions of this License, they do 
not excuse you from the conditions of this License. If 
you  cannot  distribute  so  as  to  satisfy  simultaneously 
your  obligations  under  this  License  and  any  other 
pertinent obligations, then as a consequence you may 
not distribute the Library at all. For example, if a patent 
license would not permit royalty-free redistribution of 
the Library by all those who receive copies directly or 
indirectly  through  you,  then  the  only  way  you  could 
satisfy  both  it  and  this  License  would  be  to  refrain 
entirely from distribution of the Library.
If  any  portion  of  this  section  is  held  invalid  or 
unenforceable  under  any  particular  circumstance, 
the  balance  of  the  section  is  intended  to  apply,  and 
the  section  as  a  whole  is  intended  to  apply  in  other 
circumstances.

It is not the purpose of this section to induce you to 
infringe any patents or other property right claims or 
to contest validity of any such claims; this section has 
the sole purpose of protecting the integrity of the free 
software  distribution  system  which  is  implemented 
by  public  license  practices.  Many  people  have 
made  generous  contributions  to  the  wide  range  of 

Summary of Contents for WUSB100

Page 1: ...л чит т нич ю н льт цию гл т чн Б з вы дны www sotmarket ru д бн я инф м ция т в тзывы бз ы и ы Инструкция Linksys WUSB100 Перейти в карточку товара 8 800 775 98 98 ...

Page 2: ...USER GUIDE RangePlus Wireless USB Network Adapter Model WUSB100 ver 2 ...

Page 3: ...or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossa...

Page 4: ...endix B Speciications 10 Appendix C Warranty Information 11 Limited Warranty 11 Appendix D Regulatory Information 13 FCC Statement 13 FCC Radiation Exposure Statement 13 Safety Notices 13 Industry Canada Statement 14 Règlement d Industry Canada 14 Wireless Disclaimer 14 Avis de non responsabilité concernant les appareils sans il 14 User Information for Consumer Products Covered by EU Directive 200...

Page 5: ...C via a USB port leaving your PC s slots available for other purposes The Adapter also lets you connect with any of the growing number of wireless hotspots in public places such as coffee shops airports hotels and convention centers With this Adapter your wireless networking experience can be faster and easier than ever LEDs Link Green The LED flashes when there is wireless network activity ...

Page 6: ...nable MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of e...

Page 7: ...reless Manager The Wireless Manager opens with the Connect to a Wireless Network screen This screen allows you to connect to a wireless network or to disconnect from a wireless network When the Connect to a Wireless Network screen first appears it displays a message indicating that the Wireless Manager is searching for wireless networks within range When the search is complete the screen then disp...

Page 8: ...en Wireless Network page 5 2 If your wireless network supports Wi Fi Protected Setup the icon appears next to the network s name go to How to Connect Using Wi Fi Protected Setup page 6 3 Select your network and then click Connect Select a Wireless Network 4 If the wireless network uses wireless security enter the security key and then click Next to continue Enter Wireless Network s Security Key 5 ...

Page 9: ...asks if you want to connect to a hidden network If your network is hidden select Connect to hidden network and then click Next Confirm Connection to Hidden Network NOTE If your wireless network is NOT hidden select My Network is not hidden and then click Next Follow the instructions on the next screen verifythatyournetworkrouteristurned on and is within range of the Adapter and then click Retry to...

Page 10: ...onnect to a Wireless Network screen the Wi Fi ProtectedSetupicon indicatesanetworkthatsupports Wi Fi Protected Setup Follow these instructions to connect to a wireless network using Wi Fi Protected Setup NOTE Before you begin make sure the router and the computer with the Adapter are in the same room 1 Select your network in the Connect to a Wireless Network screen and then click Connect Select th...

Page 11: ...ss Manager Connected to Your Network Congratulations The Adapter is connected to the network Enter the Adapter s PIN Number Enter the PIN Number 1 Access the web based utility of the router Refer to the router s documentation for instructions 2 On the router s Wi Fi Protected Setup screen enter the Adapter s PIN number in the appropriate field Then perform the appropriate action to save the PIN nu...

Page 12: ...n the View drop down menu of the Connect to a Wireless Network screen Saved Networks To delete a saved network form the list select the network and click Remove To change a network s position in the list select the network and click Move up or Move down How to Connect to a Saved Network To connect to a saved network follow these instructions 1 In the Connect to a Wireless Network screen select Sav...

Page 13: ...ert it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration 1 Make sure that the computers are powered on 2 Make sure that the Adapter is configured with the same Wireless Network Name SSID and wireless security settings as the other wireless computers in the Infrastructure configuration WEB If your questions...

Page 14: ...ower 802 11b 18 dBm 802 11g 18 dBm 802 11n 18 dBm Antenna Gain in dBi 2 dBi Security Features WEP Wi Fi Protected Access 2 WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 2 8 x 0 35 x 0 83 73 x 9 x 21 mm Weight 0 6 oz 17 g Certiications FCC UL CB CE Operating Temp 32 to 104ºF 0 to 40ºC Storage Temp 10 to 158ºF 10 to 70ºC Operating Humidity 10 to 85 Noncondensing Storage Hu...

Page 15: ...vice offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOS...

Page 16: ... and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services ca...

Page 17: ...nditions 1 Thisdevicemaynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation The availability of some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user FC...

Page 18: ...ces Ce matériel est conforme aux limites d exposition aux radiofréquences établies pour un environnement non contrôlé Pour assurer le maintien de cette conformité l utilisateur doit suivre les consignes d utilisation décrites dans le présent manuel Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lowe...

Page 19: ...pská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místním...

Page 20: ...από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets d...

Page 21: ...lt berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietma...

Page 22: ...e zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opr...

Page 23: ...OFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE TO BE BOUND BY THE TERMS OF SERVICE SET FORTH IN SCHEDU...

Page 24: ...inst Cisco with respect to such sites or third party software products Your correspondence or business dealings with or participation in promotions of advertisers found through the Software and any other terms conditions warranties or representations associated with such dealings are solely between you and such advertiser You agree that Cisco is not responsible or liable for any loss or damage of ...

Page 25: ... b refund the purchase price of the Software media EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTHABOVEANDTOTHEMAXIMUMEXTENTPERMITTED BY APPLICABLE LAW ALL SOFTWARE PROVIDED BY CISCO IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND Without limiting the foregoing Cisco does not warrant that the operation of the product or software will be uninterrupted or error free Also due to...

Page 26: ...th respect to any dispute with Cisco 2 Modifications Cisco may modify or cancel the terms of thisAgreementortheprice content ornatureoftheServices including discontinuing the Services program upon notice to you If Cisco modifies any of these terms you may cancel the Service by providing written notice to Cisco via www networkmagic com support of such cancellation and uninstalling the Software and ...

Page 27: ... have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of ...

Page 28: ...the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a...

Page 29: ...time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publishe...

Page 30: ... warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company ca...

Page 31: ...brary does 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the ...

Page 32: ... of the Library because it contains portions of the Library rather than a work that uses the library The executableistherefore coveredby this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source cod...

Page 33: ... may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as suc...

Page 34: ...Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVID...

Page 35: ...SS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Ori...

Page 36: ...REMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this c...

Page 37: ...л т з з любым д бным б м гл т чн я л жб дд ж и Д т в з з в в ии ф мл ни дит нл н з 2 мин ты м нии Д т в и л т вин и тзывы ции и ид и Linksys WUSB100 Описание ...

Reviews: