User Guide
Page 3
... Starter Utility for NSA221, NSA310, NSA320, and NSA325 21 NAS Starter Utility for NSA210 31 Web Configurator Basics ...47 Tutorials ...67 Technical Reference ...151 Status Screen ...153 System Setting ...157 Storage ...161 Network ...175 Applications ...185 Package Management ...229 Auto Upload ...279 Dropbox ...293 Using Time Machine with the NSA 297 Users ...301...
... Starter Utility for NSA221, NSA310, NSA320, and NSA325 21 NAS Starter Utility for NSA210 31 Web Configurator Basics ...47 Tutorials ...67 Technical Reference ...151 Status Screen ...153 System Setting ...157 Storage ...161 Network ...175 Applications ...185 Package Management ...229 Auto Upload ...279 Dropbox ...293 Using Time Machine with the NSA 297 Users ...301...
User Guide
Page 11
... 13.1 Overview ...293 13.2 Dropbox Screen ...293 13.3 How to Use Dropbox with the NSA 295 Chapter 14 Using Time Machine with the NSA 297 14.1 Overview ...297 14.2 Time Machine Screen ...297 14.3 Using Time Machine ...297 Chapter 15 Users ...301 15.1 Overview ...301 15.2 What You Can Do ...301 15.3 The Users Screen ...301...
... 13.1 Overview ...293 13.2 Dropbox Screen ...293 13.3 How to Use Dropbox with the NSA 295 Chapter 14 Using Time Machine with the NSA 297 14.1 Overview ...297 14.2 Time Machine Screen ...297 14.3 Using Time Machine ...297 Chapter 15 Users ...301 15.1 Overview ...301 15.2 What You Can Do ...301 15.3 The Users Screen ...301...
User Guide
Page 24
... new administrator password (and retype it to drag and drop files onto the NSA. Time Machine Click this to launch the zPilot to confirm). You can then create accounts for the first time. eMule This displays when the NSA has the eMule package installed. The administrator can ...log in your downloads, including those from the Internet. Use the NSA administrator credentials to use the Time Machine backup system for details on page 233 for NSA221, NSA310, NSA320, and NSA325 Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA's total,...
... new administrator password (and retype it to drag and drop files onto the NSA. Time Machine Click this to launch the zPilot to confirm). You can then create accounts for the first time. eMule This displays when the NSA has the eMule package installed. The administrator can ...log in your downloads, including those from the Internet. Use the NSA administrator credentials to use the Time Machine backup system for details on page 233 for NSA221, NSA310, NSA320, and NSA325 Table 2 NAS Starter Utility Main Screen LABEL DESCRIPTION Capacity This shows the NSA's total,...
User Guide
Page 297
... to the NSA. Apply Click this to restore the screen's last-saved settings. 14.3 Using Time Machine After enabling Time Machine on your NSA for Time Machine backups. Clear it to store Time Machine backups. CHAPTER 14 Using Time Machine with the NSA 14.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on the NSA...
... to the NSA. Apply Click this to restore the screen's last-saved settings. 14.3 Using Time Machine After enabling Time Machine on your NSA for Time Machine backups. Clear it to store Time Machine backups. CHAPTER 14 Using Time Machine with the NSA 14.1 Overview Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on the NSA...
User Guide
Page 298
Chapter 14 Using Time Machine with the NSA 1 Click Apple > System Preferences. Then click Change Disk. 3 Select share01 as the backup disk. Then click Use for Backup. 298 Media Server User's Guide Then go to System and select Time Machine. 2 Turn Time Machine ON.
Chapter 14 Using Time Machine with the NSA 1 Click Apple > System Preferences. Then click Change Disk. 3 Select share01 as the backup disk. Then click Use for Backup. 298 Media Server User's Guide Then go to System and select Time Machine. 2 Turn Time Machine ON.
User Guide
Page 299
In this example user1/12345 is used. Then turn Time Machine OFF. Then click Connect. 5 Time Machine starts backing up files to backup immediately, click Time Machine icon and select Back Up Now. 6 The screen shows the status of share01, enter the login information for an existing user account with ... and shares see Section 5.9 on page 87). If you want to share01 after 120 seconds. Media Server User's Guide 299 Chapter 14 Using Time Machine with the NSA 4 When prompted for the username and password of the backup once the process begins. 7 To stop the backup process, click the...
In this example user1/12345 is used. Then turn Time Machine OFF. Then click Connect. 5 Time Machine starts backing up files to backup immediately, click Time Machine icon and select Back Up Now. 6 The screen shows the status of share01, enter the login information for an existing user account with ... and shares see Section 5.9 on page 87). If you want to share01 after 120 seconds. Media Server User's Guide 299 Chapter 14 Using Time Machine with the NSA 4 When prompted for the username and password of the backup once the process begins. 7 To stop the backup process, click the...
User Guide
Page 440
... unless that component itself a library. The threshold for debugging such modifications. c) Accompany the work with a written offer, valid for at run time a copy of the library already present on which must supply a copy of this user a copy. If such an object file uses only ...execution displays copyright notices, you may be distributed under terms of your choice, provided that uses the Library" with the complete corresponding machine-readable source code for a charge no more than the cost of performing this distribution. For an executable, the required form of ...
... unless that component itself a library. The threshold for debugging such modifications. c) Accompany the work with a written offer, valid for at run time a copy of the library already present on which must supply a copy of this user a copy. If such an object file uses only ...execution displays copyright notices, you may be distributed under terms of your choice, provided that uses the Library" with the complete corresponding machine-readable source code for a charge no more than the cost of performing this distribution. For an executable, the required form of ...
User Guide
Page 445
... it with the complete corresponding machine-readable source code, which the executable runs, unless that component itself accompanies the executable. or, b) Accompany it . 6. Therefore, by court order, agreement or otherwise) that is not the purpose of this License to do so, and all its derivative works. Each time you under this License...
... it with the complete corresponding machine-readable source code, which the executable runs, unless that component itself accompanies the executable. or, b) Accompany it . 6. Therefore, by court order, agreement or otherwise) that is not the purpose of this License to do so, and all its derivative works. Each time you under this License...
User Guide
Page 473
...the rest onto adjacent pages. If you publish or distribute Opaque copies of the Document numbering more persons or entities responsible for either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which should put ...the first ones listed (as many as authors, one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to fit legibly, you should , if there were ...
...the rest onto adjacent pages. If you publish or distribute Opaque copies of the Document numbering more persons or entities responsible for either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which should put ...the first ones listed (as many as authors, one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to fit legibly, you should , if there were ...
User Guide
Page 500
...Creativity in license reference language is the documentation, examples, test programs, and all the other intervening text. Why the phrase "machine-executable object code generated by a source language processor"? More detailed wording was rejected as is strongly discouraged, but some Boost code...unintentionally nullify legal elements of source code or precompiled header files. Interface issues have been considered, but judicious changes in court several times; It is not "viral": if you like. No one who distributes their code under the Boost Software License, Version 1.0....
...Creativity in license reference language is the documentation, examples, test programs, and all the other intervening text. Why the phrase "machine-executable object code generated by a source language processor"? More detailed wording was rejected as is strongly discouraged, but some Boost code...unintentionally nullify legal elements of source code or precompiled header files. Interface issues have been considered, but judicious changes in court several times; It is not "viral": if you like. No one who distributes their code under the Boost Software License, Version 1.0....
User Guide
Page 574
... 157 workgroup name 158 system settings 61 T TCP/IP 176 temperature CPU 154 thumbprint 132 time 158 574 lag 157 server 159 zone 30, 160 Time Machine 297 TLS 134, 186, 279 torrent files 197, 217 health 205 info-hash 206 trackers 206 Transport Layer Security, see TLS troubleshooting domain user 351 ...
... 157 workgroup name 158 system settings 61 T TCP/IP 176 temperature CPU 154 thumbprint 132 time 158 574 lag 157 server 159 zone 30, 160 Time Machine 297 TLS 134, 186, 279 torrent files 197, 217 health 205 info-hash 206 trackers 206 Transport Layer Security, see TLS troubleshooting domain user 351 ...