background image

28

Appendix E

Software License Agreement

Wireless-G USB Network Adapter

GNU General Public License is intended to guarantee your 

freedom to share and change free software–to make sure 

the  software  is  free  for  all  its  users. This  General  Public 

License applies to most of the Free Software Foundation’s 

software  and  to  any  other  program  whose  authors 

commit to using it. (Some other Free Software Foundation 

software  is  covered  by  the  GNU  Lesser  General  Public 

License instead.) You can apply it to your programs, too. 
When  we  speak  of  free  software,  we  are  referring  to 

freedom,  not  price.  Our  General  Public  Licenses  are 

designed  to  make  sure  that  you  have  the  freedom  to 

distribute  copies  of  free  software  (and  charge  for  this 

service if you wish), that you receive source code or can 

get it if you want it, that you can change the software or 

use pieces of it in new free programs; and that you know 

you can do these things. 
To protect your rights, we need to make restrictions that 

forbid anyone to deny you these rights or to ask you to 

surrender the rights. These restrictions translate to certain 

responsibilities  for  you  if  you  distribute  copies  of  the 

software, or if you modify it. 
For example, if you distribute copies of such a program, 

whether gratis or for a fee, you must give the recipients 

all the rights that you have. You must make sure that they, 

too,  receive  or  can  get  the  source  code.  And  you  must 

show them these terms so they know their rights. 
We protect your rights with two steps: (1) copyright the 

software,  and  (2)  offer  you  this  license  which  gives  you 

legal  permission  to  copy,  distribute  and/or  modify  the 

software. 
Also,  for  each  author’s  protection  and  ours,  we  want  to 

make certain that everyone understands that there is no 

warranty for this free software. If the software is modified 

by  someone  else  and  passed  on,  we  want  its  recipients 

to know that what they have is not the original, so that 

any problems introduced by others will not reflect on the 

original authors’ reputations. 
Finally,  any  free  program  is  threatened  constantly  by 

software  patents.  We  wish  to  avoid  the  danger  that 

redistributors  of  a  free  program  will  individually  obtain 

patent licenses, in effect making the program proprietary. 

To prevent this, we have made it clear that any patent must 

be licensed for everyone’s free use or not licensed at all. 
The precise terms and conditions for copying, distribution 

and modification follow. 

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND 
MODIFICATION

This  License  applies  to  any  program  or  other  work 

0. 

which  contains  a  notice  placed  by  the  copyright 

holder  saying  it  may  be  distributed  under  the  terms 

of  this  General  Public  License. The “Program”,  below, 

refers  to  any  such  program  or  work,  and  a  “work 

based  on  the  Program”  means  either  the  Program 

or  any  derivative  work  under  copyright  law:  that  is 

to  say,  a  work  containing  the  Program  or  a  portion 

of  it,  either  verbatim  or  with  modifications  and/

or  translated  into  another  language.  (Hereinafter, 

translation is included without limitation in the term 

“modification”.)  Each  licensee  is  addressed  as  “you”.  

 

Activities  other  than  copying,  distribution  and 

modification  are  not  covered  by  this  License;  they 

are outside its scope. The act of running the Program 

is not restricted, and the output from the Program is 

covered only if its contents constitute a work based on 

the  Program  (independent  of  having  been  made  by 

running  the  Program). Whether  that  is  true  depends 

on what the Program does. 
You  may  copy  and  distribute  verbatim  copies  of  the 

1. 

Program’s source code as you receive it, in any medium, 

provided  that  you  conspicuously  and  appropriately 

publish  on  each  copy  an  appropriate  copyright 

notice and disclaimer of warranty; keep intact all the 

notices that refer to this License and to the absence 

of any warranty; and give any other recipients of the 

Program a copy of this License along with the Program.  

 

You may charge a fee for the physical act of transferring 

a  copy,  and  you  may  at  your  option  offer  warranty 

protection in exchange for a fee. 
You may modify your copy or copies of the Program 

2. 

or any portion of it, thus forming a work based on the 

Program, and copy and distribute such modifications 

or work under the terms of Section 1 above, provided 

that you also meet all of these conditions: 

You  must  cause  the  modified  files  to  carry 

a. 

prominent  notices  stating  that  you  changed  the 

files and the date of any change. 
You  must  cause  any  work  that  you  distribute  or 

b. 

publish,  that  in  whole  or  in  part  contains  or  is 

derived from the Program or any part thereof, to be 

licensed as a whole at no charge to all third parties 

under the terms of this License. 

Summary of Contents for WUSB54G

Page 1: ...USER GUIDE Wireless G USB Network Adapter Model WUSB54G...

Page 2: ...thy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use...

Page 3: ...ing 16 Appendix B Specifications 17 Appendix C Warranty Information 18 Limited Warranty 18 Appendix D Regulatory Information 20 FCC Statement 20 FCC Radiation Exposure Statement 20 Safety Notices 20 I...

Page 4: ...SB Network Adapter is easier than ever How does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wir...

Page 5: ...ble MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to e...

Page 6: ...ength and link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mod...

Page 7: ...he wireless network or since the Refresh Statistics button was last pressed Bytes Transmitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or s...

Page 8: ...has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete a...

Page 9: ...ncryption 64 Bit or 128 Bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA Personal If the network has theWPA Personal security ena...

Page 10: ...Networks This screen provides two options for setting up the Adapter SecureEasySetup ThisAdapterfeaturesSecureEasySetup This means that you can set it up with just the press of a button when connectin...

Page 11: ...dure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete and a configuration profile will has been created automaticall...

Page 12: ...l characters Click Connect and proceed to Step 3 WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Passph...

Page 13: ...dress Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addr...

Page 14: ...ich channel to use keep the default setting Network Mode Select the Network Mode in which your wireless network will operate In Mixed mode Wireless B and Wireless G devices can operate on the same net...

Page 15: ...X Key drop down box Authentication The default is set to Auto so it will auto detectforSharedKeyorOpenSystemauthentication For Shared Key authentication both the sender and the recipient share a WEP k...

Page 16: ...st Any Encryption Select the type of algorithm TKIP or AES for the encryption type PEAP WPA Enterprise PEAP Login Name Enter the login name of your wireless network in the Login Name field Password En...

Page 17: ...thentication method used inside the PEAP tunnel Click Next to continue or Back to return to the previous screen LEAP If you selected LEAP then enter the Username and Password that will authenticate yo...

Page 18: ...able the function Enter the rate in the field The default is 70 dBm Measurement To use measurement select Non Serving or Serving from the drop down menu Select Disabled to disable the function Enter t...

Page 19: ...rt it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make...

Page 20: ...sitivity 11 Mbps 82 dBm Typical 54 Mbps 67 dBm Typical Security Features WEP and WPA Encryption Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 58 x 0 91 x 2 80 91 x 23 x 71 mm C...

Page 21: ...limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product...

Page 22: ...m duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limit...

Page 23: ...ynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies...

Page 24: ...Ce mat riel est conforme aux limites d exposition aux radiofr quences tablies pour un environnement non contr l Pour assurer le maintien de cette conformit l utilisateur doit suivre les consignes d ut...

Page 25: ...a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se l...

Page 26: ...jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination e...

Page 27: ...felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands...

Page 28: ...zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj c...

Page 29: ...ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING...

Page 30: ...u fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer...

Page 31: ...To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow...

Page 32: ...of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative i...

Page 33: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program spec...

Page 34: ...for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation w...

Page 35: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropria...

Page 36: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables Wh...

Page 37: ...py modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void a...

Page 38: ...generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT H...

Page 39: ...ryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft...

Page 40: ...EVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Reviews: