background image

46

Appendix E

Software End User License Agreement

Wireless-N Home Router

Everyone  is  permitted  to  copy  and  distribute  verbatim 

copies  of  this  license  document,  but  changing  it  is  not 

allowed.

Preamble

The licenses for most software are designed to take away 

your  freedom  to  share  and  change  it.  By  contrast,  the 

GNU General Public License is intended to guarantee your 

freedom to share and change free software--to make sure 

the  software  is  free  for  all  its  users. This  General  Public 

License applies to most of the Free Software Foundation’s 

software  and  to  any  other  program  whose  authors 

commit to using it. (Some other Free Software Foundation 

software  is  covered  by  the  GNU  Lesser  General  Public 

License instead.) You can apply it to your programs, too. 
When  we  speak  of  free  software,  we  are  referring  to 

freedom,  not  price.  Our  General  Public  Licenses  are 

designed  to  make  sure  that  you  have  the  freedom  to 

distribute  copies  of  free  software  (and  charge  for  this 

service if you wish), that you receive source code or can 

get it if you want it, that you can change the software or 

use pieces of it in new free programs; and that you know 

you can do these things. 
To protect your rights, we need to make restrictions that 

forbid anyone to deny you these rights or to ask you to 

surrender the rights. These restrictions translate to certain 

responsibilities  for  you  if  you  distribute  copies  of  the 

software, or if you modify it. 
For example, if you distribute copies of such a program, 

whether gratis or for a fee, you must give the recipients 

all the rights that you have. You must make sure that they, 

too,  receive  or  can  get  the  source  code.  And  you  must 

show them these terms so they know their rights. 
We protect your rights with two steps: (1) copyright the 

software,  and  (2)  offer  you  this  license  which  gives  you 

legal  permission  to  copy,  distribute  and/or  modify  the 

software. 
Also,  for  each  author’s  protection  and  ours,  we  want  to 

make certain that everyone understands that there is no 

warranty for this free software. If the software is modified 

by  someone  else  and  passed  on,  we  want  its  recipients 

to know that what they have is not the original, so that 

any problems introduced by others will not reflect on the 

original authors’ reputations. 
Finally,  any  free  program  is  threatened  constantly  by 

software  patents.  We  wish  to  avoid  the  danger  that 

redistributors  of  a  free  program  will  individually  obtain 

patent licenses, in effect making the program proprietary. 

To prevent this, we have made it clear that any patent must 

be licensed for everyone’s free use or not licensed at all. 
The precise terms and conditions for copying, distribution 

and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND 
MODIFICATION

0.  This  License  applies  to  any  program  or  other  work 

which  contains  a  notice  placed  by  the  copyright 

holder  saying  it  may  be  distributed  under  the  terms 

of  this  General  Public  License. The “Program”,  below, 

refers  to  any  such  program  or  work,  and  a  “work 

based  on  the  Program”  means  either  the  Program 

or  any  derivative  work  under  copyright  law:  that  is 

to  say,  a  work  containing  the  Program  or  a  portion 

of  it,  either  verbatim  or  with  modifications  and/

or  translated  into  another  language.  (Hereinafter, 

translation is included without limitation in the term 

“modification”.)  Each  licensee  is  addressed  as  “you”.  

 

Activities  other  than  copying,  distribution  and 

modification  are  not  covered  by  this  License;  they 

are outside its scope. The act of running the Program 

is not restricted, and the output from the Program is 

covered only if its contents constitute a work based on 

the  Program  (independent  of  having  been  made  by 

running  the  Program). Whether  that  is  true  depends 

on what the Program does. 

1.  You  may  copy  and  distribute  verbatim  copies  of  the 

Program’s source code as you receive it, in any medium, 

provided  that  you  conspicuously  and  appropriately 

publish  on  each  copy  an  appropriate  copyright 

notice and disclaimer of warranty; keep intact all the 

notices that refer to this License and to the absence 

of any warranty; and give any other recipients of the 

Program a copy of this License along with the Program.  

 

You may charge a fee for the physical act of transferring 

a  copy,  and  you  may  at  your  option  offer  warranty 

protection in exchange for a fee. 

2.  You may modify your copy or copies of the Program 

or any portion of it, thus forming a work based on the 

Program, and copy and distribute such modifications 

or work under the terms of Section 1 above, provided 

that you also meet all of these conditions: 
a.  You  must  cause  the  modified  files  to  carry 

prominent  notices  stating  that  you  changed  the 

files and the date of any change. 

b.  You  must  cause  any  work  that  you  distribute  or 

publish,  that  in  whole  or  in  part  contains  or  is 

derived from the Program or any part thereof, to be 

licensed as a whole at no charge to all third parties 

under the terms of this License. 

Summary of Contents for WRT120N - Wireless-N Home Router Wireless

Page 1: ...USER GUIDE Wireless N Home Router Model WRT120N ...

Page 2: ...l address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossary Netwo...

Page 3: ... Wireless Advanced Wireless Settings 15 Security Firewall 16 Security VPN Passthrough 17 Access Restrictions Internet Access 17 Applications and Gaming Single Port Forwarding 19 Applications and Gaming Port Range Forwarding 19 Applications Gaming Port Range Triggering 20 Applications and Gaming DMZ 20 Applications and Gaming QoS 21 Administration Management 23 Administration Log 24 Administration ...

Page 4: ...lité concernant les appareils sans fil 34 Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksysbycisco com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and...

Page 5: ...e Wi Fi Protected Setup process Make sure the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes when a Wi Fi Protected Setup session is active The Router supports one session at a time Wait until the LED is solidly lit or off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is e...

Page 6: ...ermine where you want to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm 6 inches apart 3 Insert a screw into each hole and leave 3 mm 0 12 inches of its head exposed 4 Maneuver the Router so the wall mount slots line up with the two scre...

Page 7: ...MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in you...

Page 8: ...outer s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the browser based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first scree...

Page 9: ...he Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the numbe...

Page 10: ...nection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected...

Page 11: ... Router s DHCP server option make sure there is no other DHCP server on your network DHCP Server Setting DHCP Server DHCP is enabled by factory default If you already have a DHCP server on your network or you do not want a DHCP server then select Disabled no other DHCP features will be available DHCP Reservation Click this button if you want to assign a fixed local IP address to a MAC address DHCP...

Page 12: ... website FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO t...

Page 13: ...ck Save Settings to apply your changes or click Cancel Changes to clear your changes Setup Advanced Routing This screen is used to set up the Router s advanced functions Operating Mode allows you to select the type s of advanced functions you use Dynamic Routing automatically adjusts how packets travel on your network Static Routing sets up a fixed route to another network destination Setup Advanc...

Page 14: ...upport Wi Fi Protected Setup then you can use Wi Fi Protected Setup Configuration View To manually configure your wireless network select Manual Proceed to Basic Wireless Settings Manual page 10 To use Wi Fi Protected Setup select Wi Fi Protected Setup Proceed to Wi Fi Protected Setup page 11 BasicWireless Settings Manual Wireless Basic Wireless Settings Manual Setup Network Mode From this drop do...

Page 15: ...isabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected Setup There are three methods available Use the method that applies to the client device you are configuring Wireless Basic Wireless Settings Wi Fi Protected Setup Wi Fi Protected Setup Configured NOTE Wi Fi Protected Setup configures one client device at a time Repeat the instructions f...

Page 16: ... stands for Wired Equivalent Privacy while RADIUS stands for Remote Authentication Dial In User Service These six are briefly discussed here For detailed instructions on configuring wireless security for the Router refer to Chapter 2 Wireless Security Checklist page 3 Wireless Security Security Mode Select the security method for your wireless network If you do not want to use wireless security ke...

Page 17: ...dress of the server RADIUS Port Enter the port number of the server The default is 1812 Shared Secret Enter the key shared between the Router and the server Key Renewal Enter a Key Renewal period which instructs the Router how often it should change the encryption keys The default is 3600 seconds RADIUS This option features WEP used with a RADIUS server This should only be used when a RADIUS serve...

Page 18: ...smit Key 1 is used Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by MAC Address either permitting or blocking acc...

Page 19: ...d Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Basic Rate is not the actual rate of data transmission If you want to specify the Router s rate of data transmission configure the T...

Page 20: ...fter receiving an RTS the wireless station responds with a Clear to Send CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Security Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted...

Page 21: ...rotocol PPTP allows the Point to Point Protocol PPP to be tunneled through an IP network To allow PPTP tunnels to pass through the Router keep the default Enabled L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply...

Page 22: ...een 6 Decide which days and what times you want this policy to be enforced Select the individual days during which the policy will be in effect or select Everyday Then enter a range of hours and minutes during which the policy will be in effect or select 24 Hours 7 You can block websites with specific URL addresses Enter each URL in a separate Website Blocking by URL Address field 8 You can also b...

Page 23: ...lication documentation for more information Protocol Select the protocol s used for this application TCP UDP or Both To IP Address For each application enter the IP address of the computer that should receive the requests If you assigned a static IP address to the computer then you can look up its IP address click DHCP Reservation on the Basic Setup screen refer to DHCP Reservation page 7 Enabled ...

Page 24: ...documentation for the port number s needed ForwardedRange Foreachapplication enterthestarting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Enabled Select Enabled to enable port triggering for the applications you have defined Click Save Settings to apply your changes or click Cancel Changes to clear your c...

Page 25: ...odisabletheRouter s Acknowledgement feature so the Router will not re send data if an error occurs then select Enabled Otherwise keep the default Disabled Internet Access Priority In this section you can set the bandwidth priority for a variety of applications and devices There are four levels priority High Medium Normal or Low When you set priority donotsetallapplicationstoHigh becausethiswill de...

Page 26: ...ave up to three ranges to define for this bandwidth allocation Port numbers can range from 1 to 65535 Check your application s documentation for details on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry appears in the Summary list MAC Address QoS MAC Addr...

Page 27: ...eless access to your guests you can disable wireless access to the Router s browser based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Management Access Remote Management To permit remote access of the Router fro...

Page 28: ...hanges Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Enabled Disabled To disable the Log function select Disabled To monitor traffic between the network and the Internet keep the default Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type Select Incoming Lo...

Page 29: ...route Administration Factory Defaults Restore the Router to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Factory Defaults Restore All Settings To reset the Router s...

Page 30: ...on the Setup Basic Setup screen Domain Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen Select Release IP Address or Renew IP Address as appropriate to r...

Page 31: ...work Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode used by the network is displayed Network Name SSID The name of the wireless network which is also called the SSID is displayed Channel Width The Channel Width setting selected on the Wireless Basic Wireless Settings screen is displayed Wide Channel The Wide...

Page 32: ...insert the setup CD into your computer Click Setup and follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers 1 Select Tools Internet Optio...

Page 33: ...Appendix A Troubleshooting 29 Wireless N Home Router ...

Page 34: ...l 1 Mbps 90 dBm typical 11 Mbps 75 dBm typical 54 Mbps 66 dBm typical 270 Mbps Antenna Gain in dBi 2 0 max UPnP able cert Able Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits Up to 128 Bit Encryption OS Requirements Windows XP Vista or Vista 64 Bit Edition with Latest Updates for Network Magic and Setup Wizard Mac OS X 10 4 or higher for Setup Wizard En...

Page 35: ... or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO T...

Page 36: ...d under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdiction i...

Page 37: ...ion If this equipment does causeharmfulinterferencetoradioortelevisionreception which is found by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a...

Page 38: ...dans un environnement non contrôlé Ce matériel doit être installé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specificati...

Page 39: ...99 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követelményeket ...

Page 40: ...nden aufgeführten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have been made available for the use of wireless local area networks LANs The table labeled Overview of Regulatory Requirements for Wireless LANs provides an overview of the regulatory requirements applicable for the 2 4 and 5 GHz bands Later in this document you will find an overview of countr...

Page 41: ...ntenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external antenna s that is are shipped togetherwiththeequipment However someapplica...

Page 42: ...ice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady Sp...

Page 43: ...ίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages...

Page 44: ...dezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwordeni...

Page 45: ...iť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s te...

Page 46: ...IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE TO BE BOUND BY THE TERMS OF SERVICE SET FORTH IN SCHEDULE 2 IF ...

Page 47: ...co with respect to such sites or third party software products Your correspondence or business dealings with or participation in promotions of advertisers found through the Software and any other terms conditions warranties or representations associated with such dealings are solely between you and such advertiser You agree that Cisco is not responsible or liable for any loss or damage of any sort...

Page 48: ...d the purchase price of the Software media EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTHABOVEANDTOTHEMAXIMUMEXTENTPERMITTED BY APPLICABLE LAW ALL SOFTWARE PROVIDED BY CISCO IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND Without limiting the foregoing Cisco does not warrant that the operation of the product or software will be uninterrupted or error free Also due to the con...

Page 49: ...cations Cisco may modify or cancel the terms of thisAgreementortheprice content ornatureoftheServices including discontinuing the Services program upon notice to you If Cisco modifies any of these terms you may cancel the Service by providing written notice to Cisco via www networkmagic com support of such cancellation and uninstalling the Software and discontinuing your use of the Service Cisco m...

Page 50: ...that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License ap...

Page 51: ...s of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work me...

Page 52: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Page 53: ...ecipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make i...

Page 54: ...program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as yo...

Page 55: ... Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivativ...

Page 56: ... copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such partie...

Page 57: ...sion will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LI...

Page 58: ...RUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SS...

Page 59: ...OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code can...

Reviews: