252
distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no
warranty for this free software. For both users' and authors' sake, the GPL requires that
modified versions be marked as changed, so that their problems will not be attributed
erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the
software inside them, although the manufacturer can do so. This is fundamentally
incompatible with the aim of protecting users' freedom to change the software. The
systematic pattern of such abuse occurs in the area of products for individuals to use, which
is precisely where it is most unacceptable. Therefore, we have designed this version of the
GPL to prohibit the practice for those products. If such problems arise substantially in
other domains, we stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not
allow patents to restrict development and use of software on general-purpose computers,
but in those that do, we wish to avoid the special danger that patents applied to a free
program could make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS
0. Definitions.
“This License” refers to version 3 of the GNU General Public License.
“Copyright” also means copyright-like laws that apply to other kinds of works, such as
semiconductor masks.
“The Program” refers to any copyrightable work licensed under this License. Each licensee
is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work in a fashion
requiring copyright permission, other than the making of an exact copy. The resulting
work is called a “modified version” of the earlier work or a work “based on” the earlier work.
Содержание VIOSTOR NVR
Страница 73: ...73 ...
Страница 80: ...80 ...
Страница 90: ...90 Enter the map name and select the file The E map must be in JPEG format Click OK The E map will be shown ...
Страница 95: ...95 4 3 6 Enable Disable Event Alert To enable event alert on an E map click ...
Страница 103: ...103 2 The following dialog will be shown To add more NVR servers for playback click Edit ...
Страница 109: ...109 ii Click the Event entry tab iii Select the event type ...
Страница 111: ...111 vii The events will be shown Click OK ...
Страница 115: ...115 2 Browse and select the video files from the computer ...
Страница 116: ...116 3 The playlist will be shown Click Play to play the videos ...
Страница 118: ...118 5 To control all the playback windows at the same time click to enable Control All Views ...
Страница 121: ...121 6 The video files will be divided evenly by 16 windows ...
Страница 128: ...128 2 When the video files are shown on the playlist click and specify the IVA settings for video search ...
Страница 132: ...132 9 Click Search to start searching the video by IVA The results will be shown ...
Страница 135: ...135 2 If no NVR servers or IP cameras are shown click Edit to add an NVR server manually ...
Страница 153: ...153 7 Click Start Installation to apply the changes and initialize the system ...
Страница 157: ...157 6 2 3 View System Settings View the system settings such as the server name on this page ...
Страница 168: ...168 6 3 6 View Network Settings View the current network settings and the status of the NVR in this section ...
Страница 200: ...200 ...
Страница 212: ...212 ...
Страница 223: ...223 6 7 9 Ping Test To test the connection to an IP address enter the IP address and click Test ...
Страница 244: ...244 7 Activate the host name The DDNS host name is ready for use You can now login the NVR and set up the DDNS service ...
Страница 264: ...264 ...