105
Some
considerations
with regards to the encryption function:
•
The encryption process is
destructive
, as formatting the external drive deletes all the files on it.
•
Once this function is enabled, any
other
external
device
(uSD or USB) that is inserted into the
corresponding port, and which
does not contain the
encryption keys,
will be encrypted
and
therefore all files will be deleted. As a result, it will not be able to play content other than that
which is hosted on the media that the device itself has encrypted.
•
The external storage media
cannot be read by any other device
(including other PLAYER
ONE/PLAYER ZERO) that does not have the encryption keys.
•
The content can be read by the device that encrypted it,
as long as
the encryption option
is not
changed
. That is, if the encryption function is disabled, the device will stop using this function and
therefore will be able to read any external storage media. However, it loses the keys to the
previously encrypted external media, and you will therefore not be able to play the content stored
on them.
Please Note
: encryption is a tool that is
designed to be used in conjunction with other
content syncing
tools
: "Store and Forward" (rsync) and "Google Drive". The external storage media, as it is encrypted,
cannot be read or written to (copy contents) by any device, such as a computer. Therefore, the only device
capable of copying content onto the media is the player that encrypted it. The "Store and Forward" (rsync)
and "Google Drive" tools make this possible.
Figure 100: USB/MMC Settings
Содержание PLAYER ONE
Страница 1: ...50 0418 0102 PLAYER ONE EN PLAYER ONE AUDIO PLAYER Local and Streaming Audio Player USER MANUAL ...
Страница 28: ...28 PLAYER ONE PLAYER ZERO Web GUI v1 00r0 AUDIO PLAYERS Streaming and local media audio player USER MANUAL ...
Страница 54: ...54 Figure 32 The action of loading and playing the specified stream is configured Figure 33 ...
Страница 59: ...59 Figure 41 Finally the message located on the USB device usb will be announced with priority Figure 42 ...
Страница 85: ...85 Figure 76 accessing the network configuration Figure 77 editing network parameters ...
Страница 90: ...90 Figure 83 editing WiFi password ...
Страница 93: ...93 Enter the password of the WiFi network you want to connect to and press the SUBMIT button Figure 86 ...
Страница 95: ...95 A wireless connection to your WiFi network will be established Figure 88 ...
Страница 112: ...112 In this example su hotels Figura 107 ...
Страница 114: ...114 Figura 109 Copy from here To here ...
Страница 118: ...118 THIRD PARTY CONTROL PROTOCOL PLAYER ONE JSON Commands USUER MANUAL ...
Страница 153: ...HOW TO IDENTIFY INTERNET RADIO URL STREAMS 153 ...