background image

33

Appendix.

Warranty Coverage

Mbox’s warranty obligations are limited to the terms set forth below:

Mbox, as defined below, warrants this Mbox-branded hardware product against defects in materials and workmanship under normal use for a period 
of ONE (1) YEAR from the date of retail purchase by the original end-user purchaser (”Warranty Period”). If a hardware defect arises and a valid 
claim is received within the Warranty Period, at its option, Mbox will either (1) repair the hardware defect at no charge, using new or refurbished 
replacement parts, or (2) exchange the product with a product that is new or which has been manufactured from new or serviceable used parts and 
is at least functionally equivalent to the original product, or (3) refund the purchase price of the product. Mbox may request that you replace 
defective parts with new or refurbished user-installable parts that Mbox provides in fulfillment of its warranty obligation. A replacement product or 
part, including a user-installable part that has been installed in accordance with instructions provided by Mbox, assumes the remaining warranty of 
the original product or ninety (90) days from the date of replacement or repair, whichever provides longer coverage for you. When a product or part 
is exchanged, any replacement item becomes your property and the replaced item becomes Mbox property. Parts provided by Mbox in fulfillment of 
its warranty obligation must be used in products for which warranty service is claimed. When a refund is given, the product for which the refund is 
provided must be returned to Unicorn and becomes Mbox property.

EXCLUSIONS AND LIMITATIONS

This Limited Warranty applies only to hardware products manufactured by or for Mbox that can be identified by the “Mbox” trademark, trade name, 
or logo affixed to them. The Limited Warranty does not apply to any non-Mbox hardware products or any software, even if packaged or sold with 
Mbox hardware. Manufacturers, suppliers, or publishers, other than Mbox, may provide their own warranties to the end user purchaser, but Mbox, in 
so far as permitted by law, provides their products “as is”. Software distributed by Mbox with or without the Mbox brand name (including, but not 
limited to system software) is not covered under this Limited Warranty. Refer to the licensing agreement accompanying the software for details of 
your rights with respect to its use.

Mbox does not warrant that the operation of the product will be uninterrupted or error-free. Mbox is not responsible for damage arising from failure to
follow instructions relating to the product’s use.

This warranty does not apply

: (a) to damage caused by use with non-Mbox products; (b) to damage caused by accident, abuse, misuse, flood, 

fire, earthquake or other external causes; (c) to damage caused by operating the product outside the permitted or intended uses described by Mbox; 
(d) to damage caused by service (including upgrades and expansions) performed by anyone who is not a representative of Mbox or an Mbox 
Authorized Service Provider; (e) to a product or part that has been modified to significantly alter functionality or capability without the written 
permission of Mbox; (f) to consumable parts, such as batteries, unless damage has occurred due to a defect in materials or workmanship; or (g) if 
any Mbox serial number has been removed or defaced.

TO THE EXTENT PERMITTED BY LAW, THIS WARRANTY AND REMEDIES SET FORTH ABOVE ARE EXCLUSIVE AND IN LIEU OF ALL 
OTHER WARRANTIES, REMEDIES AND CONDITIONS, WHETHER ORAL OR WRITTEN, STATUTORY, EXPRESS OR IMPLIED. AS 
PERMITTED BY APPLICABLE LAW, UNICORN INFORMATION SYSTEMS LTD SPECIFICALLY DISCLAIMS ANY AND ALL STATUTORY OR 
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR 
PURPOSE AND WARRANTIES AGAINST HIDDEN OR LATENT DEFECTS. IF  UNICORN CANNOT LAWFULLY DISCLAIM STATUTORY OR 
IMPLIED WARRANTIES THEN TO THE EXTENT PERMITTED BY LAW, ALL SUCH WARRANTIES SHALL BE LIMITED IN DURATION TO THE 
DURATION OF THIS EXPRESS WARRANTY AND TO REPAIR OR REPLACEMENT SERVICE AS DETERMINED BY UNICORN IN ITS SOLE 
DISCRETION. No Mbox reseller, agent, or employee is authorized to make any modification, extension, or addition to this warranty.
EXCEPT AS PROVIDED IN THIS WARRANTY AND TO THE EXTENT PERMITTED BY LAW, Unicorn IS NOT RESPONSIBLE FOR DIRECT, 
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OF WARRANTY OR CONDITION, OR UNDER 
ANY OTHER LEGAL THEORY, INCLUDING BUT NOT LIMITED TO LOSS OF USE; LOSS OF REVENUE; LOSS OF ACTUAL OR ANTICIPATED 
PROFITS (INCLUDING LOSS OF PROFITS ON CONTRACTS); LOSS OF THE USE OF MONEY; LOSS OF ANTICIPATED SAVINGS; LOSS OF 
BUSINESS; LOSS OF OPPORTUNITY; LOSS OF GOODWILL; LOSS OF REPUTATION; LOSS OF, DAMAGE TO OR CORRUPTION OF DATA; 
OR ANY INDIRECT OR CONSEQUENTIAL LOSS OR DAMAGE HOWSOEVER CAUSED INCLUDING THE REPLACEMENT OF EQUIPMENT 
AND PROPERTY, ANY COSTS OF RECOVERING, PROGRAMMING, OR REPRODUCING ANY PROGRAM OR DATA STORED OR USED WITH 
UNICORN PRODUCTS AND ANY FAILURE TO MAINTAIN THE CONFIDENTIALITY OF DATA STORED ON THE PRODUCT. THE FOREGOING 
LIMITATION SHALL NOT APPLY TO DEATH OR PERSONAL INJURY CLAIMS. UNICORN DISCLAIMS ANY REPRESENTATION THAT IT WILL 
BE ABLE TO REPAIR ANY PRODUCT UNDER THIS WARRANTY OR MAKE A PRODUCT EXCHANGE WITHOUT RISK TO OR LOSS OF THE 
PROGRAMS OR DATA.

CONSUMER PROTECTION LAWS

FOR CONSUMERS WHO ARE COVERED BY CONSUMER PROTECTION LAWS OR REGULATIONS IN THEIR COUNTRY OF PURCHASE OR, 
IF DIFFERENT, THEIR COUNTRY OF RESIDENCE, THE BENEFITS CONFERRED BY THIS WARRANTY ARE IN ADDITION TO ALL RIGHTS 
AND REMEDIES CONVEYED BY SUCH CONSUMER PROTECTION LAWS AND REGULATIONS. SOME COUNTRIES, STATES AND 
PROVINCES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES OR EXCLUSIONS OR 
LIMITATIONS ON THE DURATION OF IMPLIED WARRANTIES OR CONDITIONS, SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT 
APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY BY 
COUNTRY, STATE OR PROVINCE. THIS LIMITED WARRANTY IS GOVERNED BY AND CONSTRUED UNDER THE LAWS OF THE COUNTRY 
IN WHICH THE PRODUCT PURCHASE TOOK PLACE. UNICORN, THE WARRANTOR UNDER THIS LIMITED WARRANTY, IS IDENTIFIED AT 
THE END OF THIS DOCUMENT ACCORDING TO THE COUNTRY OR REGION IN WHICH THE PRODUCT PURCHASE TOOK PLACE.

 ! "

Summary of Contents for Ultra-High Performance 2-Bay SATA NAS Server

Page 1: ...To get Mbox s Quick Guide please visit www mvix net or copy it from installation CD...

Page 2: ...0 1 2 3 1 4 5 0 2 3 1 5...

Page 3: ...3 6 2 6 6 6 2 7 8 2 8 2 3 9 8 2 8 2 8 1 2 8 2 4 7 3 3...

Page 4: ...3 9 3 3 3 3 3 3 7 7 2 0...

Page 5: ...0 1 1 9 1 3 2 3 3A 6 1 1 4 3 9 5 1...

Page 6: ...To make a user account other than sysadmin join the membership and get permission from sysadmin 2 Click the Register button on the left to move to the membership registration page 1 Input IP address a...

Page 7: ...ided 3 Bottom Left 3 You download WebDisk interface adapter In case you use WebDisk interface adapter you can execute WebDisk Explore or Windows Explorer directly without connecting website 4 Top Righ...

Page 8: ...is opened it can be used separately from the web browser 4 Run button at the bottom is activated when clicking Login button after entering ID password and server address in which web disk is installed...

Page 9: ...web browser without requiring additional program Therefore Web Explorer can be used not only in the Windows operating system but also in Macintosh and Linux 2 Web Explorer is similar to Web Disk expl...

Page 10: ...ottom is activated when clicking Login button after entering ID password and server address in which web disk is installed while Window Explorer tab is selected 5 Click Run button to execute window ex...

Page 11: ...ocol It is recommended for use in case device is in the same network as my Macintosh computer Although this protocol is fast in transmission speed there is a high possibility of this protocol becoming...

Page 12: ...nnected Shared folder that other user approved me to share Homepage basic folder Private homepage using is possible when you put homepage file on this folder Backup folder when USB Auto copy New folde...

Page 13: ...operating system So if you want to use another OS please use Web Explorer or Windows Explorer 2 WebDisk Explorer is similar to Windows explorer It is largely divided into 6 6 6 6 personal and Disk in...

Page 14: ...be changed by the user 3 If a New Folder already exists new folders are created with names followed by numbers such as New Folder 2 New Folder 3 etc 1 After selecting a file or folder for name change...

Page 15: ...ut out the file or folder to be moved using Cut After selecting the file or folder to be deleted 6 6 6 6 Cut in the Edit menu or 7 7 7 7 right click the mouse and select cut The last method is 8 8 8 8...

Page 16: ...oad progress status transfer speed and overall progress rate can be checked 5 In the list of transfer files in the upload window specific files can be deleted from the upload list or upload priority c...

Page 17: ...nload icon 3 A Download window to check the list of files for download and the download progress status is created 4 In the File list results of the file transfer can be checked In the Download Progre...

Page 18: ...the method of processing in case there are repetitive files b Overwrite overwrites the file to be uploaded or downloaded on the existing file c Resume resumes the file to be uploaded or downloaded fr...

Page 19: ...Select Shared between Shared and Unshared b There is an option to share the target folder or not Shared is selected by default c Select user to use the Shared folder and set authorization such as for...

Page 20: ...lder setup is completed the corresponding folder will be marked with a hand motif 7 Shared folders shared by others with me are displayed in the sharing list of the folder tree window 8 Folders shared...

Page 21: ...ed Folder Setup 1 Methods and functions of deleting Shared folders are the same as for general folder deletion Refer to the deleting folder section 1 2 3 5 Clearing Shared Folder Setup 1 This refers t...

Page 22: ...r to safely store files in the Secure folder WebDisk Explorer only support Secure folder function After downloading a file in the Secure folder using Web Disk explorer After downloading file in the Se...

Page 23: ...ecure folder are the same as those of using Folder File of the Web Disk explorer 2 Refer to creating folder changing File Folder name deleting File Folder and moving File Folder menu 3 Moving File Fol...

Page 24: ...Tunes program 1 2 5 OPEN public Folder 1 OPEN Public folder can share for all user 2 Movie Music Photo folder is created automatically Extra folder will be created freely 4 In case you search this equ...

Page 25: ...nd data will be backup in the folder When you push Copy Reset Button for one second on the front of USB it is starting copy from USB Store equipment with beep sound In case you push the button for 5 s...

Page 26: ...herefore Web Explorer can be used not only in the Windows operating system but also in Macintosh and Linux 2 Web Explorer is similar to Web Disk explorer It is largely divided into 6 6 6 6 a folder tr...

Page 27: ...the Browse button in the upload window and select the required file on the computer Click Add button to add up to 8 files Click Upload button to start file upload 4 Select File Folder to be uploaded...

Page 28: ...ress the OK button 4 Download can also be administered by double clicking the name of the file to be downloaded 5 Downloading a number of files or the entire folder is possible by selecting the Multip...

Page 29: ...o the list 4 Provide authorizations Read Write Read Write complete modification and click OK button The Check button must be activated before pressing the Modify button The same procedures apply for c...

Page 30: ...ded 2 Check file to be attached and click the Attach button 3 Enter ID of receiver Then enter title and contents To add more files search file and press Add To delete a file press the Delete button Pr...

Page 31: ...e of the disk drive to be connected Selection can be made among drive names currently not existing in the user s computer 3 When connection succeeds message that HDD F D D G B A FA K is displayed 1 4...

Page 32: ...wn in Window Explorer 5 When connection succeeds with My Disk Connector the icon for My Disk Connector is executed in the tray 6 To clear connection double click the My Disk Connector icon to activate...

Page 33: ...ding folder A folder cannot be attached as a link file Only files can be attached 5 When the searched file is displayed press the Add button to add the file to the list of file link for transfer A fil...

Page 34: ...ender to move to the Send Note Mail window 4 10 received notes are listed at a time in the From Message box according to time received 1 Notes transferred through Send Note Mail can be checked in the...

Page 35: ...ering URL address in which Torrent file is located 3 Select Torrent file to be registered and click Register Torrent File button Torrent file registration is completed and Register Torrent File window...

Page 36: ...F C D AA F G F A D AI F AA F FM 2 Restart Download M B F D A A F I BC F B F C FM D QN A S H A F B F G M U P H A F F B F A DA F D C F B F A GA M M B F D F A A A M 3 Cancel Download M D D F B FP D D Q...

Page 37: ...page in order to RSS Reader 2 RSS Reader shows you RSS information list of Mininova org site 3 You can receive Torrent file at Mininova org 4 In case you select category of list you can see total 20...

Page 38: ...m updated date link address for applicable site torrent file download address and torrent file size 8 In case you click torrent file registration in detailed looking page download will be started thro...

Page 39: ...ng API 4 To use blogging API check use for Status of blog API use in other setups of environment setup in blog admin page 1 Blog Main Menu a Meta Blog is a community space where you can access blogs a...

Page 40: ...og identifier ID password and language used Click Create button to create a blog 1 8 4 My Blog 1 It is execlusive page for private blog 2 You can write delete and correct And you make recent post tag...

Page 41: ...clicked window opens to display the list of files in Webdisk 3 File list shows file name size and modified date When clicking column name the files are aligned in the corresponding column in a list 4...

Page 42: ...ed Letter is subscripted All of the applied styles are cleared All of the selected parts are erased Letter at cursor is indented to the right Letter at cursor is outdented to the left Number list is w...

Page 43: ...ation date extensions 4 In the initial screen status of the current service use and particulars of an application waiting for approval are displayed Click the checkbox on the left of items to be appli...

Page 44: ...d for the newly added guest user 5 ID must be 4 16 digits Special characters or blanks etc cannot be used 6 Number of guest users to be created must be within the limit set by the administrator 7 Sele...

Page 45: ...st and administrator management Statistics Management to search service statistics and WebDisk management menu to manage basic settings of menus and services and System Management menu to manage syste...

Page 46: ...on a page 6 Users with service suspension are marked as service stop 7 The most recently registered applicants are shown at the top of list 1 Click user ID from the list to display detailed informatio...

Page 47: ...2 Delete a To completely delete user related information and files select user and click Delete b When a user withdraws membership membership information and files of the user are left behind Therefo...

Page 48: ...E mail can be sent to all searched users When no search conditions have been set an e mail is sent to all users 6 Send note to selected users Note can be sent to a user selected from list 7 Sending n...

Page 49: ...l users with names including Tom are searched Ex Tom Cruise Tom Hanks etc 2 Detailed Search a This is used to search for users compositely with various conditions b Click Detailed Search to move to th...

Page 50: ...al application date and status of application holding etc 3 In case approval of application is on hold the corresponding item of application is marked with on hold 4 The oldest application is displaye...

Page 51: ...ty increase is a request to assign additional storage capacity for a user When capacity increase request is approved the approved additional storage capacity can be used f Expiration date extension is...

Page 52: ...s b Click button in the list of applicants to create a window to write down the cause for withholding approval c Enter the cause and click the OK button to mark the corresponding applicant as on hold...

Page 53: ...applicants to satisfy the search conditions When no search conditions have been set an e mail is sent to all applicants 6 Send not to selected applicant Note can be sent to a applicant selected from...

Page 54: ...asis all users with names including Tom are searched Ex Tom Cruise Tom Hanks etc 2 Detailed Search a This is used to search applicants compositely with various conditions b Click Detail to move to the...

Page 55: ...e group to be modified and click the Modify button to modify group name and group description 5 Select the group to be deleted and click the Delete button to delete the group When a group is deleted s...

Page 56: ...expiration date 3 Basically a guest user is managed by the user who created the guest user However administrator can forcefully delete the guest user Select the guest user to be deleted and click the...

Page 57: ...ly statistics of download quantity and user distribution per band e Usage Statistics Daily statistics of the level of assignment and usage 2 First select statistical data to be searched for and set a...

Page 58: ...c date can be deleted 2 Enter date and click the Delete Previous Statistics button to delete all statistical data prior to the date entered 2 3 1 3 Viewing Statistics in Screen 1 Click Show Statistics...

Page 59: ...Path of related users 5 Upload and Download boxes are checked when it is required to search upload only download only or both upload and download When both Upload Download boxes are not checked both u...

Page 60: ...r User is in service suspension state When the period set here expires information and files of the corresponding user are automatically deleted The default value is 30 days d Language for Administrat...

Page 61: ...sers No of users to normally use the service at the current time b No of Guest Users No of guest users created by users at the current time c No of Service Applicants No of service applications made b...

Page 62: ...lder capacity of TV folder is set and the used space can be checked 2 Capacity allocated to Open public folder can be changed The default capacity allocated is 10GB 1 It is free communication board 2...

Page 63: ...Memory It shows memory size and using capacity per use for present system HDD It shows the kind of hard disk can be established maximum size I Port It shows the information of exterior input and outpu...

Page 64: ...the mail address of the system administrator is accurate a SMTP Server Accurately enter an SMTP server address Enter the SMTP server address currently used by administrator b Mail ID Account Name ente...

Page 65: ...nformation as before reinstallation 5 Upgrade a Upgraded or debugging patch file will be downloaded from the Web Disk Customer Center b Press Search button to select the downloadable file c Press Appl...

Page 66: ...low the open folder 3 Print The printer server lets you share printers on the network Once you connect a printer via USB and performs a search it comes out as a network printer Install a device driver...

Page 67: ...sk explorer port and an up download port This function is useful when it is inevitably required to change the default port due to internal network firewall policy or when using a number of Web Disks u...

Page 68: ...and the volume type is linear active Volumes are assigned and active physical error The disk is physically not normal inactive Volumes are assigned but not active Volumes are assigned and the volume...

Page 69: ...thout tables Activated abnormally without internal data structures for operation The current volume typ is mirroring Ok The volume is activated normally Not started The volume is not active degraded W...

Page 70: ...anagement of manager menu the disk information will be renewed 2 5 4 2 Adding Disk 2 In case it added new disk the disk addition button is shows up In case you click Disk Addition it adds new disk for...

Page 71: ...loadable from the www mvix net login to your account at http www Mvix net 1 Download the upgrade patch file from the www mvix net 2 Press search button to select the download file 3 Press apply to exe...

Page 72: ...ad relating file with homepage on www folder located in subordinated system folder Rename the preexisting file named index php e g to index php_ In case you use Mysql you connect sysadmin by using ssh...

Page 73: ...e IP address automatically is to run the installation program The installation wizard will lead you to a part where the device is searched automatically You can find the IP address of the device thus...

Page 74: ...er input is case sensitive Check for capital and small letters Connection from outside is possible by using port forwarding function of Internet sharer Connection to domain address is possible by usin...

Page 75: ...wnload the patch file to suit the device version Upgrade can be done by applying patch file downloaded from upgrade menu after login as system administrator After login as system administrator select...

Page 76: ...e is inevitable due to various reasons such as firewall policy etc port number of server can be changed in system administrator port setup Port number in quick connector must also be set according to...

Page 77: ...arch screen Mbox can be accessed by using IP of the equipment detected Refer to manual for detailed operations of Installer exe 32 Copy gbs_patch bin file located in System_Init directory of installat...

Page 78: ...at has been modified to significantly alter functionality or capability without the written permission of Mbox f to consumable parts such as batteries unless damage has occurred due to a defect in mat...

Page 79: ...SEQUENTIAL DAMAGES OF ANY KIND OR ANY DAMAGES WHATSOEVER INCLUDING WITHOUT LIMITATION THOSE RESULTING FROM LOSS OF USE DATA OR PROFITS WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE AND ON ANY TH...

Page 80: ...http www mvix net George lee Overseas Business Div Director george_lee eunicorn co kr Unicorn information system co ltd Unbo b d 226 16 sukchon dong songpa gu Seoul Korea Tel 82 2 420 2713 202 Fax 82...

Page 81: ...er to be used SSH is a service performing system commands like Telnet Unlike Telnet however it comes with improved security To use SSH you need to install a SSH client on your computer Bittorrent is a...

Reviews: