
Introduction
IC-402
x-4
same copyright terms except that the holder is Tim Hudson (tjh@crypt-
soft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the
code are not to be removed. If this package is used in a product, Eric Young
should be given attribution as the author of the parts of the library used. This
can be in the form of a textual message at program startup or in documen-
tation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no-
tice, this list of conditions and the following disclaimer in the documen-
tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
([email protected])”
The word ‘cryptographic’ can be left out if the rouines from the library be-
ing used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledge-
ment:
“This product includes software written by Tin Hudson (tjh@crypt-
soft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EX-
PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AU-
THOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILI-
TY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or de-
rivative of this code cannot be changed. i.e. this code cannot simply be cop-
ied and put under another distribution licence [including the GNU Public
Licence.]
In order to incorporate improvements in the product, the content of this man-
ual is subject to change without notice.
Summary of Contents for Image Controller IC-402
Page 1: ...User s Guide Network Scanner Operations Copier Network Functions Image Controller IC 402...
Page 18: ...1 Before Using the Scan Functions...
Page 36: ...2 Scanning Documents...
Page 113: ...Scanning Documents 2 IC 402 2 78 4 Touch Yes to delete the job 5 Touch Close...
Page 119: ...Scanning Documents 2 IC 402 2 84...
Page 120: ...3 Registering Destinations Recipients for Network Scanning...
Page 139: ...Registering Destinations Recipients for Network Scanning 3 IC 402 3 20...
Page 140: ...4 Other Network Scanning Settings...
Page 157: ...Other Network Scanning Settings 4 IC 402 4 18...
Page 158: ...5 Specifying Network Scanning Settings...
Page 172: ...6 Copier Network Functions...
Page 230: ...7 Using PageScope Web Connection...
Page 261: ...Using PageScope Web Connection 7 IC 402 7 32 4 Enter the settings and click Apply...
Page 275: ...Using PageScope Web Connection 7 IC 402 7 46...
Page 305: ...Using PageScope Web Connection 7 IC 402 7 76...
Page 306: ...8 Print Job Management...
Page 326: ...9 Appendix...
Page 340: ...Copyright 2005 2006 2 4037 7170 01 www konicaminolta net...