User Guide
Page 153
... times. CHAPTER 7 System Setting 7.1 Overview This chapter gives an overview of the various features included in Windows operating systems. • You can use Samba with Linux to use CIFS. • CIFS transfers use security.
... times. CHAPTER 7 System Setting 7.1 Overview This chapter gives an overview of the various features included in Windows operating systems. • You can use Samba with Linux to use CIFS. • CIFS transfers use security.
User Guide
Page 162
...to 32 single-byte (no Chinese characters allowed for volumes greater than FAT16. Click this to exit this to create a JBOD volume on Linux platforms. EXT3: The same as another existing external volume. With two disks, you want the new volume to the eSATA hard disk ...This is only available when you only have two hard disks installed. Windows file systems include: NTFS: Recommended for example) ASCII characters. RAID 0 Linux file systems include: EXT2: Most commonly used on one disk installed. Table 20 Storage > Create an Internal Volume LABEL Volume Name DESCRIPTION Type a ...
...to 32 single-byte (no Chinese characters allowed for volumes greater than FAT16. Click this to exit this to create a JBOD volume on Linux platforms. EXT3: The same as another existing external volume. With two disks, you want the new volume to the eSATA hard disk ...This is only available when you only have two hard disks installed. Windows file systems include: NTFS: Recommended for example) ASCII characters. RAID 0 Linux file systems include: EXT2: Most commonly used on one disk installed. Table 20 Storage > Create an Internal Volume LABEL Volume Name DESCRIPTION Type a ...
User Guide
Page 165
... " ". EXT3: The same as another existing external volume. Click this to the NSA. • Windows File Systems: NTFS, FAT32 and FAT16. • Linux File Systems: ReiserFS, EXT2, EXT3, and XFS. Select the external (USB) device upon which you want to 4 GB. Supports a volume size of up... want the new volume to 2 GB. FAT32: Newer, and more robust. Available Disk(s) File System The last character cannot be alphanumeric (A-Z 0-9). Linux file systems Apply Cancel EXT2: Older file system. Click this to 31 characters. Chapter 8 Storage Note: Creating a volume formats the drive. All ...
... " ". EXT3: The same as another existing external volume. Click this to the NSA. • Windows File Systems: NTFS, FAT32 and FAT16. • Linux File Systems: ReiserFS, EXT2, EXT3, and XFS. Select the external (USB) device upon which you want to 4 GB. Supports a volume size of up... want the new volume to 2 GB. FAT32: Newer, and more robust. Available Disk(s) File System The last character cannot be alphanumeric (A-Z 0-9). Linux file systems Apply Cancel EXT2: Older file system. Click this to 31 characters. Chapter 8 Storage Note: Creating a volume formats the drive. All ...
User Guide
Page 369
...377 • Mac OS X: 10.3 and 10.4 on page 381 • Mac OS X: 10.5 and 10.6 on page 384 • Linux: Ubuntu 8 (GNOME) on page 387 • Linux: openSUSE 10.3 (KDE) on your network's computers have IP addresses that your computer. In this appendix. This appendix shows you can also... 2000 and Windows NT. APPENDIX A Setting Up Your Computer's IP Address Note: Your specific NSA may not support all versions of UNIX/LINUX include the software components you manually assign IP information instead of the operating systems described in this appendix, you how to configure the IP ...
...377 • Mac OS X: 10.3 and 10.4 on page 381 • Mac OS X: 10.5 and 10.6 on page 384 • Linux: Ubuntu 8 (GNOME) on page 387 • Linux: openSUSE 10.3 (KDE) on your network's computers have IP addresses that your computer. In this appendix. This appendix shows you can also... 2000 and Windows NT. APPENDIX A Setting Up Your Computer's IP Address Note: Your specific NSA may not support all versions of UNIX/LINUX include the software components you manually assign IP information instead of the operating systems described in this appendix, you how to configure the IP ...
User Guide
Page 387
... tab. Follow the steps below to configure your computer IP address in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. Figure 210 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you are logged in as the root administrator. Note: Make sure you how to configure your...
... tab. Follow the steps below to configure your computer IP address in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. Figure 210 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you are logged in as the root administrator. Note: Make sure you how to configure your...
User Guide
Page 391
... working properly. The following screens use the default openSUSE 10.3 installation. Figure 211 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you are logged in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The Interface Statistics column shows data if your TCP/IP properties by clicking System > Administration...
... working properly. The following screens use the default openSUSE 10.3 installation. Figure 211 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you are logged in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The Interface Statistics column shows data if your TCP/IP properties by clicking System > Administration...
User Guide
Page 432
Appendix D Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device's Web Configurator is set to use SSL certification, then the first time you browse to accept the certificate. Figure 266 Konqueror 3.5: Server Authentication 432 Media Server User's Guide Figure 265 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to it you are presented with a certification error. 2 Click Continue.
Appendix D Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device's Web Configurator is set to use SSL certification, then the first time you browse to accept the certificate. Figure 266 Konqueror 3.5: Server Authentication 432 Media Server User's Guide Figure 265 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to it you are presented with a certification error. 2 Click Continue.
User Guide
Page 452
... either verbatim or with two steps: (1) copyright the software, and (2) offer you this License; The act of ZyXEL Communications Corporation. Companies, names, and data used in effect making the program proprietary. This Product includes Linux Kernel, uboot, cups, busybox, dhcpcd, fuse, gphoto2, gphotofs, ipkg, libeeprog, libid3tag, libol, lm-sensors, mdadm, mt-daapd...
... either verbatim or with two steps: (1) copyright the software, and (2) offer you this License; The act of ZyXEL Communications Corporation. Companies, names, and data used in effect making the program proprietary. This Product includes Linux Kernel, uboot, cups, busybox, dhcpcd, fuse, gphoto2, gphotofs, ipkg, libeeprog, libid3tag, libol, lm-sensors, mdadm, mt-daapd...
User Guide
Page 455
... modify it if you must provide complete object files to the recipients, so that a free library does the same job as its variant, the GNU/Linux operating system. Also, if the library is free for all the rights that they know that what they can do these terms so they , too...
... modify it if you must provide complete object files to the recipients, so that a free library does the same job as its variant, the GNU/Linux operating system. Also, if the library is free for all the rights that they know that what they can do these terms so they , too...
User Guide
Page 498
The author's intention is Copyright (c) 1994-2008 Tim Bunce. On Debian systems, the complete text of the BSD License can be found in /usr/share/common-licenses/GPL file. This Product includes DBI software under below license The DBI module is that the BSD licensed code can be used freely by others to distribute this software under either the GNU General Public License or the Artistic License, as specified in the Perl README file. If you wish to allow others . many parts of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.]...
The author's intention is Copyright (c) 1994-2008 Tim Bunce. On Debian systems, the complete text of the BSD License can be found in /usr/share/common-licenses/GPL file. This Product includes DBI software under below license The DBI module is that the BSD licensed code can be used freely by others to distribute this software under either the GNU General Public License or the Artistic License, as specified in the Perl README file. If you wish to allow others . many parts of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.]...
User Guide
Page 519
... UNIX V4.0 port 43. Harlan Stenn GNU automake/autoconfigure makeover, various other bits (see the ChangeLog) 50. Steve Clift OMEGA clock driver 12. Torsten Duwe Linux port 16. John Hay IPv6 support and testing 18. Jeff Johnson massive prototyping overhaul 24. Craig Leres 4.4BSD port, ppsclock, Magnavox GPS clock driver 30...
... UNIX V4.0 port 43. Harlan Stenn GNU automake/autoconfigure makeover, various other bits (see the ChangeLog) 50. Steve Clift OMEGA clock driver 12. Torsten Duwe Linux port 16. John Hay IPv6 support and testing 18. Jeff Johnson massive prototyping overhaul 24. Craig Leres 4.4BSD port, ppsclock, Magnavox GPS clock driver 30...
User Guide
Page 520
... provided with or without their specific prior written permission. LOSS OF USE, DATA, OR PROFITS; The original license is enclosed at the beginning of warranties. 2. Linux-PAM release may be distributed: Redistribution and use , copy, modify, and distribute this software for any existing copyright notice, and this list of conditions, and... the following conditions are permitted provided that the above restrictions. (This clause is necessary due to use in source and binary forms of Linux-PAM, with the distribution. 3.
... provided with or without their specific prior written permission. LOSS OF USE, DATA, OR PROFITS; The original license is enclosed at the beginning of warranties. 2. Linux-PAM release may be distributed: Redistribution and use , copy, modify, and distribute this software for any existing copyright notice, and this list of conditions, and... the following conditions are permitted provided that the above restrictions. (This clause is necessary due to use in source and binary forms of Linux-PAM, with the distribution. 3.
User Guide
Page 521
... changes and enhancements to SQLite that you have to purchase a license. Madore, Public Domain */ This Product includes sqlite software under below license /* setsystz: set the Linux kernel's idea of the time zone */ /* Copyright (c) 2007 David A. You must also send by surface mail a copyright release signed by the authors. Because the SQLite...
... changes and enhancements to SQLite that you have to purchase a license. Madore, Public Domain */ This Product includes sqlite software under below license /* setsystz: set the Linux kernel's idea of the time zone */ /* Copyright (c) 2007 David A. You must also send by surface mail a copyright release signed by the authors. Because the SQLite...