User Guide
Page 5
... is more secure than a traditional wired network. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are at a rapid pace. Change the default password For wireless products such as the...more vulnerable to -peer). For example, you will be the only option available on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to intruders than a network encrypted with specific MAC addresses. Like signals from ...
... is more secure than a traditional wired network. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are at a rapid pace. Change the default password For wireless products such as the...more vulnerable to -peer). For example, you will be the only option available on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to intruders than a network encrypted with specific MAC addresses. Like signals from ...
User Guide
Page 14
...evaluation, testing or demonstration purposes for Linksys, at your product or experience a problem with nonLinksys products, (d) the product has not been installed, operated, repaired, or maintained in addition to you . This limited warranty shall not apply to intrusion or attack. TO THE EXTENT ...original end-user purchaser. The telephone number for intruding upon and attacking networks, Linksys does not warrant that the product, service, software or any equipment, system or Compact Wireless-G USB Adapter Warranty Information network on how long an implied warranty lasts, so the ...
...evaluation, testing or demonstration purposes for Linksys, at your product or experience a problem with nonLinksys products, (d) the product has not been installed, operated, repaired, or maintained in addition to you . This limited warranty shall not apply to intrusion or attack. TO THE EXTENT ...original end-user purchaser. The telephone number for intruding upon and attacking networks, Linksys does not warrant that the product, service, software or any equipment, system or Compact Wireless-G USB Adapter Warranty Information network on how long an implied warranty lasts, so the ...
User Guide
Page 20
...are not EU member states, the EU Directive 1999/5/EC has also been implemented in those countries. 2. These antennas have Adobe Acrobat installed on www.linksys.com/international Follow these steps to access technical documents: 1. Select the appropriate product category. 5. The document will open... operating within the boundaries of the owner's property, its use of software or firmware not supported/provided by Linksys may require the antenna(s), if removable, to be separated from the product and installed remotely from the Electronic Communications Office. Check http://www.arcep.fr/...
...are not EU member states, the EU Directive 1999/5/EC has also been implemented in those countries. 2. These antennas have Adobe Acrobat installed on www.linksys.com/international Follow these steps to access technical documents: 1. Select the appropriate product category. 5. The document will open... operating within the boundaries of the owner's property, its use of software or firmware not supported/provided by Linksys may require the antenna(s), if removable, to be separated from the product and installed remotely from the Electronic Communications Office. Check http://www.arcep.fr/...
User Guide
Page 25
...made available at the Linksys public web site at www.linksys.com/gpl or as applicable. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. "Software" includes, and this product and may also be available for the Upgrade. or CiscoLinksys K.K. ("Linksys")... Upgrades; (ii) to You by Linksys in its suppliers. Compact Wireless-G USB Adapter Software License Agreement Schedule 1 - BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO...
...made available at the Linksys public web site at www.linksys.com/gpl or as applicable. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. "Software" includes, and this product and may also be available for the Upgrade. or CiscoLinksys K.K. ("Linksys")... Upgrades; (ii) to You by Linksys in its suppliers. Compact Wireless-G USB Adapter Software License Agreement Schedule 1 - BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO...
User Guide
Page 28
...bring the other licensees extend to the entire whole, and thus to it with Subsection b above on a medium customarily used for software interchange; Accompany it . These actions are not derived from the original licensor to copy, distribute or modify the Program subject to ...on which must be distributed under Section 2) in full compliance. 5. However, as a whole. Any attempt otherwise to control compilation and installation of that is not required to print an announcement.) These requirements apply to work written entirely by modifying or distributing the Program (or...
...bring the other licensees extend to the entire whole, and thus to it with Subsection b above on a medium customarily used for software interchange; Accompany it . These actions are not derived from the original licensor to copy, distribute or modify the Program subject to ...on which must be distributed under Section 2) in full compliance. 5. However, as a whole. Any attempt otherwise to control compilation and installation of that is not required to print an announcement.) These requirements apply to work written entirely by modifying or distributing the Program (or...
User Guide
Page 31
... that uses the facility, other than copying, distribution and modification are outside its terms, do not apply to control compilation and installation of data to be combined with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is entirely welldefined independent of ...and modification follow. Therefore, Subsection 2d requires that any medium, provided that you changed the files and the date of any software library or other than as an argument passed when the facility is invoked, then you distribute the same sections as separate ...
... that uses the facility, other than copying, distribution and modification are outside its terms, do not apply to control compilation and installation of data to be combined with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is entirely welldefined independent of ...and modification follow. Therefore, Subsection 2d requires that any medium, provided that you changed the files and the date of any software library or other than as an argument passed when the facility is invoked, then you distribute the same sections as separate ...
User Guide
Page 33
... conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of the library, if the user installs one that uses the Library" must be distributed under any portion of the Library by all those who have not signed it. For... copying library functions into the executable, and (2) will automatically terminate your acceptance of performing this distribution. Compact Wireless-G USB Adapter Software License Agreement 8. A suitable mechanism is implemented by public license practices. For an executable, the required form of the free...
... conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of the library, if the user installs one that uses the Library" must be distributed under any portion of the Library by all those who have not signed it. For... copying library functions into the executable, and (2) will automatically terminate your acceptance of performing this distribution. Compact Wireless-G USB Adapter Software License Agreement 8. A suitable mechanism is implemented by public license practices. For an executable, the required form of the free...