User Guide
Page 21
NSA-220 Plus User's Guide 21 CHAPTER 1 Getting to Know Your NSA This chapter covers the main features and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage Appliance) to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA... • Have the NSA handle large file downloads. • Automatically download files from website feeds for convenient viewing. • Play the NSA's video, music and photo files on your computers using the included media client software. • Play the NSA's video, music and ...
NSA-220 Plus User's Guide 21 CHAPTER 1 Getting to Know Your NSA This chapter covers the main features and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage Appliance) to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA... • Have the NSA handle large file downloads. • Automatically download files from website feeds for convenient viewing. • Play the NSA's video, music and photo files on your computers using the included media client software. • Play the NSA's video, music and ...
User Guide
Page 132
... using a web browser without having to log into the 132 NSA-220 Plus User's Guide BitTorrent breaks up your computer's system resources. The NSA streams files to the NSA. Download Service The NSA's download service downloads files from www.apple.com. Web Publishing Web publishing lets you use Apple's iTunes software on a computer to play video, music, and photos from...
... using a web browser without having to log into the 132 NSA-220 Plus User's Guide BitTorrent breaks up your computer's system resources. The NSA streams files to the NSA. Download Service The NSA's download service downloads files from www.apple.com. Web Publishing Web publishing lets you use Apple's iTunes software on a computer to play video, music, and photos from...
User Guide
Page 150
... field displays when the file was successfully downloaded to have the NSA automatically determine the download task's priority. A tracker is used for finding peers sharing the file. NSA-220 Plus User's Guide This information is a server used to verify the torrent file....software-based firewall on Info-Hash Tracker Close Select High to have all of hacking attacks, which can be protected against by a good firewall. This field displays the tracker that NSA is not between your IP address. Click this download task. Enter a description for downloading the task. Ideally your NSA...
... field displays when the file was successfully downloaded to have the NSA automatically determine the download task's priority. A tracker is used for finding peers sharing the file. NSA-220 Plus User's Guide This information is a server used to verify the torrent file....software-based firewall on Info-Hash Tracker Close Select High to have all of hacking attacks, which can be protected against by a good firewall. This field displays the tracker that NSA is not between your IP address. Click this download task. Enter a description for downloading the task. Ideally your NSA...
User Guide
Page 151
... viruses. BitTorrent and Your Firewall The anti-virus feature on a firewall probably cannot check BitTorrent downloads for viruses, so use your firewall's HTML (web-based) configuration interface to NSA-220 Plus User's Guide 151 The firewall slows this down because by default, it only allows traffic from...incoming TCP port 6881 and UDP port 6880 connections to the NSA. When you download using BitTorrent, many other BitTorrent users are also trying to download the file from you). You probably need to use anti-virus software on the Internet from getting files from you. Chapter 7 ...
... viruses. BitTorrent and Your Firewall The anti-virus feature on a firewall probably cannot check BitTorrent downloads for viruses, so use your firewall's HTML (web-based) configuration interface to NSA-220 Plus User's Guide 151 The firewall slows this down because by default, it only allows traffic from...incoming TCP port 6881 and UDP port 6880 connections to the NSA. When you download using BitTorrent, many other BitTorrent users are also trying to download the file from you). You probably need to use anti-virus software on the Internet from getting files from you. Chapter 7 ...
User Guide
Page 365
..., non-transferable license to make one NSA-220 Plus User's Guide 365 PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. ZYXEL MAY HAVE DISTRIBUTED TO YOU HARDWARE AND/OR SOFTWARE, OR MADE AVAILABLE FOR ELECTRONIC DOWNLOADS THESE FREE SOFTWARE PROGRAMS OF THRID PARTIES AND YOU ARE...
..., non-transferable license to make one NSA-220 Plus User's Guide 365 PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. ZYXEL MAY HAVE DISTRIBUTED TO YOU HARDWARE AND/OR SOFTWARE, OR MADE AVAILABLE FOR ELECTRONIC DOWNLOADS THESE FREE SOFTWARE PROGRAMS OF THRID PARTIES AND YOU ARE...
User Guide
Page 478
... from time to time contribute changes and enhancements to likewise disclaim their SQLite changes and enhancements back to download the SQLite software from that are excluded from http://www.sqlite.org/. You must also send by surface mail a copyright release ...the original source of SQLite. 478 NSA-220 Plus User's Guide Nobody is not properly a part of the software, or in his contributions to the software, use this document because the process of this document, "SQLite software" shall mean any other information that is software that implements an embeddable SQL database ...
... from time to time contribute changes and enhancements to likewise disclaim their SQLite changes and enhancements back to download the SQLite software from that are excluded from http://www.sqlite.org/. You must also send by surface mail a copyright release ...the original source of SQLite. 478 NSA-220 Plus User's Guide Nobody is not properly a part of the software, or in his contributions to the software, use this document because the process of this document, "SQLite software" shall mean any other information that is software that implements an embeddable SQL database ...
User Guide
Page 511
... or use of ZyXEL Communications Corporation. Disclaimers ZyXEL does not assume any products, or software described herein. Do not use , misuse, or disuse of any other ZyXEL product. You are also stored elsewhere. All rights reserved. This publication is not responsible for illegal purposes. ZyXEL is subject to the following two conditions: NSA-220 Plus User's Guide 511...
... or use of ZyXEL Communications Corporation. Disclaimers ZyXEL does not assume any products, or software described herein. Do not use , misuse, or disuse of any other ZyXEL product. You are also stored elsewhere. All rights reserved. This publication is not responsible for illegal purposes. ZyXEL is subject to the following two conditions: NSA-220 Plus User's Guide 511...