Samsung Security Camera SNB 7002 User Guide

NETWORK CAMERA  
User Manual  
SNB-7002/SND-7082/  
SND-7082F/SNV-7082  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
IMPORTANT SAFETY INSTRUCTIONS  
1. Read these instructions.  
2. Keep these instructions.  
3. Heed all warnings.  
4. Follow all instructions.  
5. Do not use this apparatus near water.  
6. Clean only with dry cloth.  
7. Do not block any ventilation openings, Install in accordance with the manufacturers  
instructions.  
8. Do not install near any heat sources such as radiators, heat registers, stoves, or other  
apparatus (including amplifiers) that produce heat.  
9. Do not defeat the safety purpose of the polarized or grounding-type plug. A polarized  
plug has two blades with one wider than the other. A grounding type plug has two  
blades and a third grounding prong. The wide blade or the third prong are provided for  
your safety. If the provided plug does not fit into your outlet, consult an electrician for  
replacement of the obsolete outlet.  
10. Protect the power cord from being walked on or pinched particularly at plugs,  
convenience receptacles, and the point where they exit from the apparatus.  
11. Only use attachments/ accessories specified by the manufacturer.  
12. Use only with the cart, stand, tripod, bracket, or table specified by  
the manufacturer, or sold with the apparatus. When a cart is used,  
use caution when moving the cart/apparatus combination to avoid  
injury from tip-over.  
13. Unplug this apparatus during lighting storms or when unused for  
long periods of time.  
14. Refer all servicing to qualified service personnel. Servicing is required when the  
apparatus has been damaged in any way, such as power-supply cord or plug is  
damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus  
has been exposed to rain or moisture, does not operate normally, or has been dropped.  
English _3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
WARNING  
TO REDUCE THE RISK OF FIRE OR ELECTRIC SHOCK, DO NOT EXPOSE  
THIS PRODUCT TO RAIN OR MOISTURE. DO NOT INSERT ANY METALLIC  
OBJECT THROUGH THE VENTILATION GRILLS OR OTHER OPENNINGS  
ON THE EQUIPMENT.  
Apparatus shall not be exposed to dripping or splashing and that no objects  
filled with liquids, such as vases, shall be placed on the apparatus.  
To prevent injury, this apparatus must be securely attached to the Wall/ceiling  
iCn AacUcoTrdIOanNce with the installation instructions.  
CAUTION  
RISK OF ELECTRIC SHOCK.  
DO NOT OPEN  
: TO REDUCE THE RISK OF ELECTRIC SHOCK.  
CAUTION  
DO NOT REMOVE COVER (OR BACK).  
NO USER SERVICEABLE PARTS INSIDE.  
REFER SERVICING TO QUALIFIED SERVICE PERSONNEL.  
EXPLANATION OF GRAPHICAL SYMBOLS  
The lightning flash with arrowhead symbol, within an  
equilateral triangle, is intended to alert the user to the  
presence of “dangerous voltage” within the product’s  
enclosure that may be of sufficient magnitude to constitute a  
risk of electric shock to persons.  
The exclamation point within an equilateral triangle is intended  
to alert the user to the presence of important operating  
and maintenance (servicing) instructions in the literature  
accompanying the product.  
4_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Class construction  
An apparatus with CLASS construction shall be connected to a MAINS  
socket outlet with a protective earthing connection.  
Battery  
Batteries(battery pack or batteries installed) shall not be exposed to excessive  
heat such as sunshine, fire or the like.  
Danger of explosion if battery is incorrectly replaced.  
Replace only with the same or equivalent type.  
Disconnection Device  
Disconnect the main plug from the apparatus, if it’s defected. And please call  
a repair man in your location.  
When used outside of the U.S., it may be used HAR code with fittings of  
an approved agency is employed.  
CAUTION  
These servicing instructions are for use by qualified service personnel only.  
To reduce the risk of electric shock do not perform any servicing other than  
that contained in the operating instructions unless you are qualified to do so.  
The BNC Out terminal of the product is provided for easier installation, and is  
not recommended for monitoring purposes.  
If you keep the BNC cable connected, a risk of lightening may cause damage  
or malfunction to the product.  
Please use the input power with just one camera and other devices must not  
be connected.  
English _5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
Please read the following recommend safety precautions carefully.  
Do not place this apparatus on an uneven surface.  
Do not install on a surface where it is exposed to direct sunlight, near  
heating equipment or heavy cold area.  
Do not place this apparatus near conductive material.  
Do not attempt to service this apparatus yourself.  
Do not place a glass of water on the product.  
Do not install near any magnetic sources.  
Do not block any ventilation openings.  
Do not place heavy items on the product.  
User’s Manual is a guidance book for how to use the products.  
The meaning of the symbols are shown below.  
Reference : In case of providing information for helping of products usages  
Notice : If theres any possibility to occur any damages for the goods and  
human caused by not following the instruction  
Please read this manual for the safety before using of goods and keep it in  
the safe place.  
6_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONTENTS  
3
Important Safety Instructions  
Product Features  
OVERVIEW  
9
10  
Recomended PC Specifications  
Recomended SD/SDHC Memory  
Card Specifications  
10  
3
11  
14  
18  
22  
25  
What’s Included  
At a Glance (SNB-7002)  
At a Glance (SND-7082)  
At a Glance (SND-7082F)  
At a Glance (SNV-7082)  
28  
30  
32  
34  
39  
43  
Mounting the Lens (SNB-7002)  
Installation (SND-7082)  
INSTALLATION &  
CONNECTION  
Installation (SND-7082F)  
Installation (SNV-7082)  
Inserting/Removing a SD Memory Card  
Memory Card Information  
(Not Included)  
28  
44  
Connecting with other Device  
50  
51  
Connecting the Camera Directly  
to Local Area Networking  
Connecting the Camera Directly  
to a DHCP Based DSL/Cable  
Modem  
NETWORK CONNECTION  
AND5SET0UP  
52  
53  
Connecting the Camera Directly  
to a PPPoE Modem  
Connecting the Camera to a  
Broadband Router with the  
PPPoE/Cable Modem  
54  
55  
59  
60  
62  
62  
Buttons used in IP Installer  
Static IP Setup  
Dynamic IP Setup  
Port Range Forward (Port  
Mapping) Setup  
Connecting to the Camera from  
a Shared Local PC  
Connecting to the Camera from  
a Remote PC via the Internet  
English _7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
63  
64  
65  
69  
70  
72  
73  
Connecting to the Camera  
Login  
WEB VIEWER  
Installing Silverlight Runtime  
Installing STW WebViewer Plugin  
Using the Live Screen  
Search and play by event  
Search and play by time  
63  
75  
75  
91  
Setup  
SETUP SCREEN  
Video & Audio Setup  
Network Setup  
100 Event Setup  
75  
APPENDIX  
116 System Setup  
123 Specification  
129 Product Overview  
133 Troubleshooting  
135 Open Source Announcement  
123  
8_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PRODUCT FEATURES  
• Full HD Video Quality  
• Multi-Streaming  
This network camera can display videos in different resolutions and qualities  
simultaneously using different CODECs.  
• Web Browser-based Monitoring  
Using the Internet web browser to display the image in a local network environment.  
• Alarm  
If an event occurs, the event-related video will be transferred to the FTP/email specified  
by the user or saved to the SD memory, or the event signal will be sent to the Alarm Out  
port.  
Tampering Detection  
Detects tempering attempts on video monitoring.  
• Motion Detection  
Detects motion from the cameras video input.  
• Intelligent Video Analysis  
Analyzes video to detect logical events of specified conditions from the cameras video  
input.  
• Face Detection  
Detects faces from the cameras video input.  
• Smart Codec  
Adaptively applies codecs for a portion of the cameras field of view to improve the quality  
of such area specified by user.  
• Audio Detection  
Detects sound louder than a certain level specified by user.  
• Auto Detection of Disconnected Network  
Detects network disconnection before triggering an event.  
• ONVIF Compliance  
This product supports ONVIF.  
For more information, refer to www.onvif.org.  
English _9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
RECOMENDED PC SPECIFICATIONS  
CPU : Intel Core 2 Duo 2.4GHz or higher  
Operating System : Windows XP, VISTA, 7, Mac OS  
Resolution : 1280X1024 pixels or higher (32 bit color)  
RAM : 2GB or higher  
Web Browser : Internet Explorer 7 or Higher, Firefox 9 or Higher, Chrome 15 or Higher,  
Safari 5.1 or Higher  
Neither a beta test version unlike the version released in the company website nor the developer version will  
be supported.  
It is recommended to connect to IPv6 in Windows 7.  
Video Memory : 256MB or higher  
If the driver of the video graphic adapter is not installed properly or is not the latest version, the  
J
video may not be played properly.  
For a multi-monitoring system involving at least 2 monitors, the playback performance can be  
deteriorated depending on the system.  
RECOMENDED SD/SDHC MEMORY CARD SPECIFICATIONS  
4GB ~ 32GB  
It is recommended to use memory cards of at least class 6 speed.  
10_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WHAT’S INCLUDED  
Please check if your camera and accessories are all included in the product package.  
Appearance  
Item Name  
Quantity  
Description  
Model Name  
1
1
1
1
2
1
1
SNB-7002 or  
SND-7082 or  
SND-7082F or  
SNV-7082  
Camera  
Instruction book,  
Installer S/W CD,  
CMS S/W DVD  
SNB-7002/  
SND-7082/  
SND-7082F/  
SNV-7082  
Quick Guide  
(Optional)  
Used to test the camera  
connection to a portable display  
device  
Cable for the testing  
monitor  
English _11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
Appearance  
Item Name  
Quantity  
Description  
Model Name  
C Mount Adapter,  
Used to install the C Mount  
camera lens  
1
Auto Iris Lens Connector  
Used to install the camera  
holder  
Camera Holder (Mount)  
1
2
1
1
3
1
1
1
SNB-7002  
Camera Holder (Mount)  
Screws  
Used to install the mount  
Used for alarm in/out terminals  
Used for alarm in/out terminals  
Used for fixing to an iron plate  
Product installation guide  
6-position Terminal Block  
5-position Terminal Block  
Iron Screw  
SND-7082/  
SND-7082F/  
SNV-7082  
SND-7082/  
SND-7082F  
Template  
SND-7082F/  
SNV-7082  
Jack Modular  
LAN cable gender  
Prevents dust ingress into the  
wiring connection part.  
Dustproof Plate  
SND-7082  
12_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appearance  
Item Name  
Quantity  
Description  
Model Name  
Tapping Screw  
1
Used to fix the safety bracket  
SND-7082F  
Bracket Safety  
1
4
Safety Bracket  
Used for installation on the wall  
or ceiling  
ASSY-Tapping Screw  
Used to remove/  
L Wrench  
1
4
4
fix the dome cover  
SNV-7082  
SNB-7002  
For fixing a screw,  
Inserted in a hole  
Plastic Anchor  
Machine Screws  
(reinforced anchoring force)  
Used for assembling the dome  
case when installing the product  
on the pipe, wall mount, etc. or  
blocking a hole.  
Lens Options (not included)  
Optional lens to be inserted in  
a camera  
CS/C Lens  
English _13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
AT A GLANCE (SNB-7002)  
Front Side  
b
a
<Fixed Bracket>  
c
d
Item  
Description  
Camera Holder  
Used when you mount the camera onto the bracket by fixing the camera  
a
b
(Mount) Holes  
holder (mount) adaptor with the bracket.  
Used to fix the camera on a bracket or mounting bracket.  
The screw size : use this screw to fix the mounting bracket.  
Mounting Bracket  
Screw Hole  
1/4" - 20UNC (20THREAD)  
L : 4.5mm 0.2mm (ISO Standard) or 0.197" (ASA  
Standard)  
14_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
Auto Iris Lens  
Installed on the lens adaptor.  
c
d
(Optional)  
Auto Iris Lens  
Connector  
Used to supply power and output signal to control the iris of the lens.  
Wipe out a dirty surface of the lens softly with a lens tissue or cloth to which you have applied  
ethanol.  
M
Mounting Bracket is not included.  
For more information to use mounting bracket, refer to the product’s documentation.  
English _15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
Rear Side  
a
b
c
d
e
j
i
f
h g  
Item  
Description  
SD Memory Card  
Compartment for the SD memory card.  
a
Compartment  
AUDIO OUT  
AUDIO IN  
Used to connect to speakers.  
Audio terminal  
b
Used to connect to a microphone.  
ON : A memory card is inserted and operates normally.  
Flashing : Failed to record, insufficient space, or inserted  
SD  
abnormally.  
OFF : Camera is off, camera is restarting, memory card is  
not in place, or when record is off.  
SD, Power Indicators  
c
ON : While the power is on  
OFF : If the power is off  
POWER  
16_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
The button restores all camera settings to the factory default.  
Press and hold for about 5 seconds to reboot the system.  
If you reset the camera, the network settings will be adjusted so that  
J
Reset Button  
DHCP can be enabled. If there is no DHCP server in the network, you  
must run the IP Installer program to change the basic network settings  
such as IP address, Subnet mask, Gateway, etc., before you can connect  
to the network.  
d
Focus Adjustment  
Button  
Power Port  
The button adjusts the focus of image automatically.  
Used to plug the power cable.  
e
f
g
h
Lightning protective Used to discharge the lightning current safely outside in order to protect the  
grounding port  
Network Port  
camera.  
Used to connect the PoE or Ethernet cable for network connection.  
ALARM IN  
ALARM OUT  
GND  
Used to connect the alarm input signal.  
Used to connect the alarm output signal.  
Used for earth-grounding.  
Alarm I/O Port  
i
j
Output port for test monitoring the video output. Use the test monitor cable  
Test Monitor Out  
to connect to a mobile display and check the test video.  
English _17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
AT A GLANCE (SND-7082)  
Appearance  
a
b
c
d
e
f
g
Item  
Top cover  
Description  
Case cover used to protect the lens and the main unit.  
a
b
Camera Case  
Housing part that covers the camera body.  
18_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Power Port  
Description  
Used to plug the power cable.  
c
d
Output port for test monitoring the video output. Use the test monitor cable  
to connect to a mobile display and check the test video.  
Test Monitor Out  
Network Port  
Audio In Jack  
Audio Out Jack  
Used to connect the PoE or Ethernet cable for network connection.  
Used to connect to a microphone.  
e
f
g
Used to connect to speakers.  
English _19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
Components  
a
c
b
d
UNLOCK  
UNLOCK  
g
f e  
h
i
j
20_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
Lens  
Lens for the camera.  
a
b
ALARM IN  
ALARM OUT  
GND  
Used to connect the alarm input signal.  
Used to connect the alarm output signal.  
Used for earth-grounding.  
Alarm I/O Port  
The button restores all camera settings to the factory default.  
Press and hold for about 5 seconds to reboot the system.  
If you reset the camera, the network settings will be adjusted so that  
J
Reset Button  
DHCP can be enabled. If there is no DHCP server in the network, you  
must run the IP Installer program to change the basic network settings  
such as IP address, Subnet mask, Gateway, etc., before you can  
connect to the network.  
c
Output port for test monitoring the video output. Use the test monitor cable  
Test Monitor Out  
d
e
f
g
h
to connect to a mobile display and check the test video.  
Focus Adjustment  
The button adjusts the focus of image automatically.  
Compartment for the SD memory card.  
Button  
SD Memory Card  
Compartment  
Press the <UNLOCK> levers on both ends to separate camera module from  
Lock Release Lever  
Bracket  
the body.  
Used to install the camera on the wall or ceiling with the screws.  
If you drill a hole in the wiring cover for wiring,  
remove the cover and attach the provided  
dustproof plate to it, and arrange the cables  
through the plate.  
Wiring Cover  
Release Lock  
i
j
If you want to remove the bracket from the main unit or remove the camera  
from the bracket, push this out and turn the main unit in the <UNLOCK>  
direction.  
English _21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
AT A GLANCE (SND-7082F)  
Appearance  
a
b
c
d
e
f
g
Item  
Top cover  
Description  
Case cover used to protect the lens and the main unit.  
Housing part that covers the camera body.  
Used to plug the power cable.  
a
b
c
Camera Case  
Power Port  
Output port for test monitoring the video output. Use the test monitor cable  
to connect to a mobile display and check the test video.  
Test Monitor Out  
d
Network Port  
Audio In Jack  
Audio Out Jack  
Used to connect the PoE or Ethernet cable for network connection.  
Used to connect to a microphone.  
e
f
g
Used to connect to speakers.  
22_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Components  
a b  
c
d
Item  
Description  
Network Port  
Used to connect the PoE or Ethernet cable for network connection.  
a
ALARM IN  
ALARM OUT  
GND  
Used to connect the alarm input signal.  
Used to connect the alarm output signal.  
Used for earth-grounding.  
Alarm I/O Port  
b
Output port for test monitoring the video output. Use the test monitor cable  
Test Monitor Out  
c
to connect to a mobile display and check the test video.  
The button restores all camera settings to the factory default.  
Press and hold for about 5 seconds to reboot the system.  
If you reset the camera, the network settings will be adjusted so that  
J
Reset Button  
DHCP can be enabled. If there is no DHCP server in the network, you  
must run the IP Installer program to change the basic network settings  
such as IP address, Subnet mask, Gateway, etc., before you can  
connect to the network.  
d
English _23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
e f  
g
h
Item  
Description  
Press the <UNLOCK> levers on both ends to separate camera module from  
Lock Release Lever  
e
f
g
h
the body.  
Lens  
Lens for the camera.  
Focus Adjustment  
The button adjusts the focus of image automatically.  
Button  
SD Memory Card  
Compartment  
Compartment for the SD memory card.  
24_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
AT A GLANCE (SNV-7082)  
Appearance  
a
b
c
d
e
f
g
Item  
Top cover  
Description  
Case cover used to protect the lens and the main unit.  
Housing part that covers the camera body.  
Used to plug the power cable.  
a
b
c
Camera Case  
Power Port  
Output port for test monitoring the video output. Use the test monitor cable  
to connect to a mobile display and check the test video.  
Test Monitor Out  
d
Network Port  
Audio In Jack  
Audio Out Jack  
Used to connect the PoE or Ethernet cable for network connection.  
Used to connect to a microphone.  
e
f
g
Used to connect to speakers.  
English _25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
overview  
Components  
a b  
c
d
Item  
Description  
Network Port  
Used to connect the PoE or Ethernet cable for network connection.  
a
ALARM IN  
ALARM OUT  
GND  
Used to connect the alarm input signal.  
Used to connect the alarm output signal.  
Used for earth-grounding.  
Alarm I/O Port  
b
Output port for test monitoring the video output. Use the test monitor cable  
Test Monitor Out  
c
to connect to a mobile display and check the test video.  
The button restores all camera settings to the factory default.  
Press and hold for about 5 seconds to reboot the system.  
If you reset the camera, the network settings will be adjusted so that  
J
Reset Button  
DHCP can be enabled. If there is no DHCP server in the network, you  
must run the IP Installer program to change the basic network settings  
such as IP address, Subnet mask, Gateway, etc., before you can  
connect to the network.  
d
26_ overview  
Download from Www.Somanuals.com. All Manuals Search And Download.  
e f  
g
h
i
Item  
Description  
Press the <UNLOCK> levers on both ends to separate camera module from  
Lock Release Lever  
e
f
g
h
the body.  
Lens  
Lens for the camera.  
Focus Adjustment  
The button adjusts the focus of image automatically.  
Button  
SD Memory Card  
Compartment  
Compartment for the SD memory card.  
If you want to remove the bracket from the main unit or remove the camera  
from the bracket, push this out and turn the main unit in the <UNLOCK>  
direction.  
Release Lock  
i
English _27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
MOUNTING THE LENS (SNB-7002)  
Disconnect the power before proceeding.  
The C lens and CS lens are not included in the product package.  
M
It is recommended that megapixel lens are use on this camera to optimise performance.  
Mounting the CS lens on a camera  
Turn the optional CS lens clockwise to insert it.  
CS Lens  
Mounting the C lens on a camera  
Turn the C mount adaptor clockwise to insert it and do the same with the C lens.  
C Lens  
28_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Connecting the Auto Iris Lens connector  
Insert the lens connector into the corresponding hole of the camera.  
Focusing  
Turn the lens left or right to control the zoom and focus the lens so that you can view a clear,  
sharp object.  
English _29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
Precautions before installation  
Ensure you read out the following instructions before installing the camera:  
When installing on a ceiling or wall, desired spot must be capable of supporting at least 5  
times of the cameras weight.  
Stuck-in or peeled-off cables can cause damage to the product or a fire.  
For safety purposes, keep anyone else away from the installation site.  
And put aside personal belongings from the site, just in case.  
INSTALLATION (SND-7082)  
Disassembling  
1. Take the camera body with one hand  
and take the top cover with the other  
Top cover  
hand. Then, turn the cover counter  
clockwise to remove it.  
Camera Body  
2. Press the <UNLOCK> levers on both ends  
to separate camera module from the body.  
30_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Hold down the lock lever in the outer direction as shown  
and turn the camera body in the <UNLOCK> direction  
(counter clockwise) to remove the bracket from the  
body.  
Camera Body  
If it fails, take the bottom hole of the bracket and turn the  
bracket in the <LOCK> direction (clockwise) to remove it.  
Bracket  
Installation  
1. Use the provided screws (x3) to fix the  
bracket to a desired position on the ceiling or  
wall.  
Ensure that the <CAMERA FRONT> label on the  
bracket faces the direction for camera monitoring.  
2. Arrange the cables through the bracket to  
the ceiling or wall.  
If you drill a hole in the ceiling cover for wiring, press  
hard to remove the cover and attach the dust-proof  
plate to it, and arrange the cables through the plate.  
If you intend to arrange the cables without drilling a  
hole, use the empty area opposite to the <CAMERA  
FRONT> label side for the wiring purpose.  
Wiring Cover  
3. Mount the camera body onto the bracket.  
Align the marking hole of the camera body with the <CAMERA FRONT> label of the  
bracket, and turn the body in the <LOCK> direction.  
4. Assemble the camera module to the body.  
5. Refer to “Adjusting the monitoring direction  
for the camera” to adjust the lens in a desired  
direction. (page 38)  
6. Close the top cover.  
Fit the top cover into the fixing tips of the camera  
body and turn the cover clockwise.  
English _31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
INSTALLATION (SND-7082F)  
Disassembling  
1. Take the camera body with one  
hand and take the top cover  
with the other hand. Then, turn  
the cover counter clockwise to  
remove it.  
Top cover  
Camera Body  
Installation  
1. Use the provided template to drill one hole for  
the camera, and one for the screw (5 mm in  
diameter, at least 35 mm in depth), and insert  
the plastic anchor (HUR 5) to the end of the  
screw hole.  
2. Connect and arrange the necessary cables  
lest that they should be damaged or twisted  
while installing the camera.  
3. Insert the camera body into the hole so that it  
fits to the camera hole, and fix the body using  
the ASSY tapping screws (TH M4xL30). (x3)  
4. Refer to “Adjusting the monitoring direction for the camera” to adjust the lens in  
a desired direction. (page 38)  
5. Close the top cover.  
Fit the top cover into the fixing tips of the camera body and turn the cover clockwise.  
32_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To add an alarm cable (not included)  
1. For this, first you should remove the top cover  
from the housing.  
2. Pull out the protruding rubber bar as shown.  
3. This will reveal a hole in the place of the rubber  
bar, through which you insert the cable, and  
connect it to the alarm terminal on the PCB.  
4. Connect and arrange the necessary cables  
(power, video, etc) lest that they should be  
damaged or caught while installing the camera.  
Then, install the camera assembly in the reverse  
order of the disassembly.  
5. Refer to “Adjusting the monitoring direction  
for the camera” to adjust the lens in a desired  
direction. (page 38)  
6. Close the top cover.  
English _33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
INSTALLATION (SNV-7082)  
Disassembling  
1. With the provided L-shaped  
wrench, loosen 3 bolts on the  
top cover counter clockwise to  
remove the cover.  
Top cover  
Bolts  
Camera Body  
Camera Case  
2. Loosen 3 screws on the camera  
body counter clockwise, and  
push down the left/right LOCKER  
lever (in the arrow direction) to  
release the lock. Then, remove  
LOCKER Lever  
the camera from the case.  
34_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installing on the ceiling directly  
1. Remove the top cover from the case by referring to the “Disassembling” section.  
(page 34)  
2. Drill a hole (diameter: 5mm, depth: min 35mm) in a  
desired position of the case bottom and insert the  
provided plastic anchor (HUD 5) to the end.  
3. Fit the bottom hole to the anchor hole and insert  
and fix the ASSY taping screw (TH M4×L30).  
When assembling the camera case to a junction box, select  
appropriate screw holes on the case bottom for installation.  
4. Connect and arrange the necessary cables lest that  
they should be damaged or twisted while installing  
the camera.  
5. Install the camera body in the reverse order of  
CAMERA FRONT  
Disassembling”. (page 34)  
6. Adjust the lens in a desired direction by referring to the “Adjusting the monitoring  
direction for the camera" section. (page 38)  
7. Close the top cover.  
To ensure waterproofing, tight up the fixing bolts using the L-wrench.  
Ceiling mount  
1. Remove the top cover from the case by  
referring to the “Disassembling” section.  
(page 34)  
2. Use the provided template to drill one hole for  
the camera, and one for the screw (5 mm in  
diameter, at least 35 mm in depth), and insert  
the plastic anchor (HUR 5) to the end of the  
screw hole.  
3. Connect and arrange the necessary cables  
lest that they should be damaged or twisted  
while installing the camera.  
English _35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
4. Loosen and remove the case-fixing screws on the camera unit. (x3)  
5. Insert the camera unit into the hole so that it fits to the camera hole, and fix the unit  
using the ASSY tapping screws (TH M4×L30). (x3)  
6. Adjust the lens in a desired direction by referring to the “Adjusting the monitoring  
direction for the camera” section. (page 38)  
7. Close the top cover.  
To ensure waterproofing, tight up the fixing bolts using the L-wrench.  
Attaching to the unbundled adapter  
Choose and purchase a necessary one of the following options (unbundled) that is suitable  
to the installation site or for your convenience.  
1. Remove the top cover from the case by referring to  
the “Disassembling” section. (page 34)  
2. Use the provided machine screw to fix the camera  
case to the unbundled adapter.  
3. Connect and arrange the necessary cables lest that  
they should be damaged or twisted while installing  
the camera.  
4. Install the camera body in the reverse order of  
Disassembling”. (page 34)  
5. Adjust the lens in a desired direction by referring to  
the “Adjusting the monitoring direction for the  
camera” section. (page 38)  
6. Close the top cover.  
To ensure waterproofing, tight up the fixing bolts using the L-wrench.  
Optional Accessories for Installation  
For your easier installation, you can purchase appropriate optional accessories available.  
1. WALL MOUNT ADAPTOR(SBP-300WM or  
SBP-300WM1)/HANGING MOUNT  
(SBP-300HM3)  
This adaptor is used when installing the  
dome camera onto a wall.  
36_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2. CEILING MOUNT ADAPTOR(SBP-300CM)/  
HANGING MOUNT(SBP-300HM3)  
This adaptor is used when installing the dome  
camera on a concrete ceiling.  
3. POLE MOUNT ADAPTOR(SBP-300PM)  
This is an adaptor for WALL MOUNT ADAPTOR  
(SBP-300WM or SBP-300WM1) installation on a  
pole whose diameter is bigger than 80mm.  
4. CORNER MOUNT ADAPTOR (SBP-300KM)  
This is an adaptor for WALL MOUNT  
ADAPTOR (SBP-300WM or SBP-300WM1)  
installation on the corner of wall joint.  
English _37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
Adjusting the monitoring direction for the camera (SND-7082/  
SND-7082F/SNV-7082)  
Pan  
Tilt cramp screw  
Tilt  
Lens rotation  
Cover front  
Adjusting the monitoring direction  
You can adjust the camera direction only when the camera is fixed on the ceiling.  
Where, rotating the camera unit to the left or right is called Pan, adjusting the tilt is called  
Tilt, and turning the lens on its axis is called Rotation.  
- The effective range of pan is a total of 355 degrees.  
- The effective range of rotation is a total of 355 degrees.  
- The effective range of tilt is a total of 90 degrees.  
In some angles, the top cover may cause cutting some part of the monitoring object.  
J
Do not rotate the focus/zoom lens by force after removing the cover front.  
Otherwise, it may cause an incorrect focus due to a motor failure.  
Methods of adjustment  
1. After installing the camera, adjust the panning angle in consideration of the  
monitoring direction.  
When tilting the camera, you should adjust the horizontal angle lest that the image  
be displayed reversely.  
2. Adjust the rotation angle to correct the image display position (up/down/left/right).  
Rotation means rotation on the basis of the rear lens unit.  
3. Adjust the tilt angle so that the camera faces toward the monitoring object.  
38_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INSERTING/REMOVING A SD MEMORY CARD  
Disconnect the power cable from the camera before inserting the SD memory card.  
J
Inserting a SD Memory Card  
Loosen the screw and open the cover of the SD memory card. Insert the SD card in the  
arrow direction as shown.  
<SNB-7002>  
Push the SD memory card in the direction of the arrow shown in the diagram.  
UNLOCK  
UNLOCK  
<SND-7082>  
English _39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
<SND-7082F>  
<SNV-7082>  
Do not insert the SD memory card while it’s upside down by force. Otherwise, it may damage the  
J
SD memory card.  
40_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Removing a SD Memory Card  
Gently press down on the exposed end of the memory card as shown in the diagram to  
eject the memory card from the slot.  
<SNB-7002>  
UNLOCK  
UNLOCK  
<SND-7082>  
English _41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
<SND-7082F>  
<SNV-7082>  
Pressing too hard on the SD memory card can cause the card to shoot out uncontrollably from the  
J
slot when released.  
To remove the SD memory card, set the card to <Off> in <Storage> menu and press  
[Apply (  
)] button. (Page 102)  
Removing the SD memory card while it’s in use for saving may damage the data stored in the  
card.  
42_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MEMORY CARD INFORMATION (NOT INCLUDED)  
What is a memory card?  
The memory card is an external data storage device that has been developed to offer an  
entirely new way to record and share video, audio, and text data using digital devices.  
Selecting a memory card that’s suitable for you  
Your camera supports SD/SDHC memory cards.  
You may, however, experience compatibility issues depending on the model and make of  
the memory card.  
For your camera, we recommend you use a memory card from the following  
manufacturers:  
SD/SDHC Memory Card : Sandisk, Transcend  
Memory cards of 4GB ~ 32GB is recommended for using with this camera.  
Playback performance can be affected depending on the speed of memory card, so use  
the high-speed memory card.  
It is recommended to use memory cards of at least class 6 speed.  
Memory Card Use  
SD and SDHC memory cards feature a switch that disables writing data on to the media.  
Having this switch to the Lock position will prevent accidental deletion of data stored in the  
memory card but at the same time will also prevent you from writing data on to the media.  
Memory Card Components  
Contacts  
Lock Switch  
SD/SDHC  
English _43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
CONNECTING WITH OTHER DEVICE  
Monitor to install  
Power  
Grounding cable  
Ethernet  
Power  
Ethernet  
Monitor to install  
The BNC Out terminal of the product is provided for easier installation, and is not recommended  
for monitoring purposes. If you keep the BNC cable connected, a risk of lightening may cause  
damage or malfunction to the product.  
J
44_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ethernet Connection  
Connect the Ethernet cable to the local network or to the Internet.  
Power Supply  
Use the screwdriver to connect each line (+, –) of the power cable to the corresponding  
power port of the camera.  
If both PoE (Power over Ethernet) and DC 12V are supplied, the product will operate with the first-  
J
applied power source.  
-
-
-
You can also use a router featuring PoE to supply power to the camera.  
Use PoE that is compliant with the IEEE802.3af protocols.  
It is advisable to use only one power source from PoE and DC12V.  
The heater will operate properly only by the power source of PoE. (SNV-7082)  
-
-
If using DC 12V, the heater will not operate at all.  
Use PoE in a low-temperature place of less than -10°C.  
Be careful not to reverse the polarity when you connect the power cable.  
If you want to connect an external device, you must turn off the external device before proceeding.  
Electrical Resistance of Copper Wire at [20°C (68°F)]  
2
2
2
2
Copper Wire Gauge (AWG)  
#24(0.22mm ) #22(0.33mm ) #20(0.52mm ) #18(0.83mm )  
Resistance (Ω/m)  
0.078  
0.028  
0.050  
0.018  
0.030  
0.011  
0.018  
0.006  
Drop Voltage (V/m)  
Recommended Distance (m)  
Less than 20  
Less than 30  
Less than 30  
Less than 30  
As shown in the table above, you may encounter a voltage-sag depending on the wire length.  
If you use an excessively long wire for camera connection, the camera may not work properly.  
Camera Operating Voltage : DC 12V 10%  
-
-
Voltage drop measurements on the chart above may vary depending on the type and manufacture of  
the copper cable.  
English _45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
Grounding the Product (SNB-7002)  
Use a screw driver to connect earth grounding cable to the ground terminal below the  
power inlet terminal.  
Grounding protects the product from a surge or lightning.  
When grounding, make sure to turn the product’s power off.  
J
Recommended Grounding Cable  
Length : Less than 3M  
Gauge : 18 AWG or bigger  
Ex) UL1007 AWG 18/16, UL1015 AWG18/16/14/12, UL2468 AWG18/16/14  
46_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Connecting to Audio Input/Output  
Speaker  
PC  
Microphone  
Network  
Microphone  
Speaker  
Microphone  
Speaker  
Amp  
Amp  
Amp  
Microphone  
Microphone  
Speaker  
Amp  
Speaker  
English _47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
installation & connection  
1. Connect the AUDIO IN port of the camera with the microphone or LINE OUT port of  
the amplifier that the microphone is connected to.  
2. Connect the AUDIO OUT port of the camera with the speaker or LINE IN port of the  
amplifier that the speaker is connected to.  
3. Check the specifications for audio input.  
• Audio Codec  
G.711 PCM. μ-law 64kbps 8kHz / G.726 (16Kbps, 24Kbps, 32Kbps, 40Kbps)  
sampling  
• Full duplex Audio  
• Audio in  
Used for mono signal line input (Max.2.4 Vpp)  
• Audio out  
Used for mono signal line output (Max.2.4 Vpp)  
• Line out impedance  
600ꢀ  
Connecting to the I/O port box (SNB-7002)  
Connect the Alarm I/O signal to the corresponding port of the rear port box.  
ALARM IN : Used to connect the alarm input signal.  
ALARM OUT : Used to connect the alarm output signal.  
GND : Used for earth-grounding.  
48_ installation & connection  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Connecting to the I/O port box (SND-7082/SND-7082F/SNV-7082)  
Connect the Alarm I/O cable to the corresponding port of the inner port box.  
1 : ALARM IN 4 : -  
2 : ALARM OUT 5 : -  
3 : GND  
UNLOCK  
ALARM IN : Used to connect the alarm input signal.  
ALARM OUT : Used to connect the alarm output signal.  
GND : Used for earth-grounding.  
To connect the external sensor  
Connect one strand of each signal line (2-strand) of the sensors to the [ALARM IN] port,  
and connect the other strand to the [GND] port.  
Alarm I/O Wiring Diagram  
English _49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
You can set up the network settings according to your network configurations.  
CONNECTING THE CAMERA DIRECTLY TO LOCAL AREA  
NETWORKING  
Connecting to the camera from a local PC in the LAN  
1. Launch an Internet browser on the local PC.  
2. Enter the IP address of the camera in the address bar of the browser.  
Camera  
INTERNET  
Firewall  
External Remote PC  
Camera  
DDNS Server  
(Data Center, KOREA)  
Local PC  
<Local Network>  
A remote PC in an external Internet out of the LAN network may not be able to connect to the  
camera installed in the intranet if the port-forwarding is not properly set or a firewall is set.  
In this case, to resolve the problem, contact your network administrator.  
M
By factory default, the IP address will be assigned from the DHCP server automatically. If there is  
no DHCP server available, the IP address will be set to 192.168.1.100.  
To change the IP address, use the IP Installer.  
For further details on IP Installer use, refer to “Static IP Setup”. (Page 55)  
50_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONNECTING THE CAMERA DIRECTLY TO A DHCP  
BASED DSL/CABLE MODEM  
INTERNET  
DSL/Cable Modem  
External Remote PC  
Camera  
DDNS Server  
(Data Center, KOREA)  
1. Use the cross LAN cable to connect the network cable directly to your PC.  
2. Run the IP Installer and change the IP address of the camera so that you can use  
the web browser on your desktop to connect to the Internet.  
3. Use the Internet browser to connect to the web viewer.  
4. Move to [Setup] page.  
5. Move to [Network] – [DDNS] and configure the DDNS settings.  
6. Move to [Network] – [Interface], and set the network type to [DHCP].  
7. Connect the camera, which was removed from your PC, directly to the modem.  
8. Restart the camera.  
For registering the DDNS settings, refer to “Registering with DDNS”. (page 94)  
M
For configuring the DDNS settings, refer to “DDNS”. (page 93)  
For setting the network type, refer to “Interface”. (page 91)  
English _51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
CONNECTING THE CAMERA DIRECTLY TO A PPPoE  
MODEM  
INTERNET  
PPPoE Modem  
External Remote PC  
Camera  
DDNS Server  
(Data Center, KOREA)  
1. Use the cross LAN cable to connect the network cable directly to your PC.  
2. Run the IP Installer and change the IP address of the camera so that you can use  
the web browser on your desktop to connect to the Internet.  
3. Use the Internet browser to connect to the web viewer.  
4. Move to [Setup] page.  
5. Move to [Network] – [DDNS] and configure the DDNS settings.  
6. Move to [Network] – [Interface], and set the network type to [PPPoE].  
7. Connect the camera, which was removed from your PC, directly to the modem.  
8. Restart the camera.  
For registering the DDNS settings, refer to “Registering with DDNS”. (page 94)  
M
For configuring the DDNS settings, refer to “DDNS”. (page 93)  
For setting the network type, refer to “Interface”. (page 91)  
52_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONNECTING THE CAMERA TO A BROADBAND ROUTER  
WITH THE PPPoE/CABLE MODEM  
This is for a small network environment such as homes, SOHO and ordinary shops.  
Camera  
INTERNET  
PPPoE or  
PPPoE or  
Broadband  
Router  
Cable Modem  
Cable Modem  
External Remote PC  
Camera  
DDNS Server  
(Data Center, KOREA)  
Local PC  
Configuring the network settings of the local PC connected to a  
Broadband Router  
Configuring the network settings of the local PC connected to a Broadband Router, follow  
the instructions below.  
Select : <Network Neighborhood> <Properties> <Local Area Connection>  
<Properties> <General> <Internet Protocol (TCP/IP)> <Properties>   
<Obtain an IP address automatically> or <Use the following IP address>.  
Follow the instructions below if you select <Use the following IP address>:  
ex1) If the address (LAN IP) of the Broadband Router is 192.168.1.1  
IP address : 192.168.1.100  
Subnet Mask : 255.255.255.0  
Default Gateway : 192.168.1.1  
ex2) If the address (LAN IP) of the Broadband Router is 192.168.0.1  
IP address : 192.168.0.100  
Subnet Mask : 255.255.255.0  
Default Gateway : 192.168.0.1  
ex3) If the address (LAN IP) of the Broadband Router is 192.168.xxx.1  
IP address : 192.168.xxx.100  
Subnet Mask : 255.255.255.0  
Default Gateway : 192.168.xxx.1  
For the address of the Broadband Router, refer to the product’s documentation.  
M
For more information about port forwarding of the broadband router, refer to "Port Range  
Forward (Port Mapping) Setup”. (Page 60)  
English _53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
BUTTONS USED IN IP INSTALLER  
a
b c  
d
e
f
g
h i  
j
k
l
m
Item  
Description  
Model name of the connected camera.  
Device Name  
Click the column to sort the list by model name.  
a
However, search will be stopped if clicked during the search.  
This function is not currently implemented.  
Alias  
b
c
Displays either <Static>, <Dynamic> or <PPPoE> for the current network  
Mode  
connection status.  
Ethernet address for the connected camera.  
MAC(Ethernet)  
Address  
Click the column to sort the list by Ethernet address.  
d
e
f
However, search will be stopped if clicked during the search.  
IP address.  
IP Address  
Protocol  
Click the column to sort the list by IP address.  
However, search will be stopped if clicked during the search.  
Network setting for the camera.  
The factory default is “IPv4”.  
Cameras with the IPv6 setting will be displayed “IPv6”.  
54_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
DDNS URL address enabling access from the external Internet.  
However, this will be replaced with the <IP Address> of the camera if  
DDNS registration has failed.  
URL  
g
IPv4  
IPv6  
Scans for cameras with the IPv4 setting.  
h
i
Scans for cameras with the IPv6 setting.  
Activated in an IPv6 compliant environment only.  
Scans for cameras that are currently connected to the network.  
Search  
j
k
l
m
However, this button will be grayed out if neither IPv4 nor IPv6 is checked.  
Auto Set  
Manual Set  
Exit  
The IP Installer automatically configures the network settings.  
You should configure the network settings manually.  
Exits the IP Installer program.  
For the IP installer, use only the installer version provided in the installation CD or use the latest one if  
available. You can download the latest version from the Samsung web site (www.samsungcctv.com).  
M
STATIC IP SETUP  
Manual Network Setup  
Run <IP Installer_v2.XX.exe> to display the camera search list.  
At the initial startup, both [Auto Set] and [Manual Set] will be grayed out.  
For cameras found with the IPv6 setting, these buttons will be grayed out as the cameras do not  
M
support this function.  
1. Select a camera in the search list.  
Check the MAC address of the camera  
on the cameras label.  
Both the [Auto Set] and [Manual Set]  
buttons will be activated.  
2. Click [Manual Set].  
The Manual Setting dialog appears.  
The default values of <IP Address>,  
<Subnet Mask>, <Gateway>, <HTTP Port> and <VNP Port> of the camera will  
be displayed.  
English _55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
3. In the <Address> pane, provide the  
necessary information.  
MAC (Ethernet) Address : The MAC  
address imprinted on the camera  
label is automatically displayed and  
requires no user setting.  
You can configure the static IP settings  
M
only if the DHCP checkbox is unchecked.  
If not using a Broadband Router  
For setting <IP Address>, <Subnet Mask>, and <Gateway>, contact your network administrator.  
4. In the <Port> pane, provide necessary  
information.  
HTTP Port : Used to access the  
camera using the Internet browser,  
defaulted to 80.  
VNP Port : Used to control the video  
signal transfer, defaulted to 4520.  
5. Enter the password.  
Enter the password of “admin” account, which was used to access the camera.  
The default password is “4321”.  
The default password can be exposed to a hacking thread so it is recommended to change the  
J
password after installing the product.  
Note that the security and other related issues caused by the unchanged password shall be  
responsible for the user.  
If you want to change the password, refer to “Administrator password change” of the user  
setup. (page 118)  
6. Click [OK].  
Manual network setup will be completed.  
56_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If using a Broadband Router  
IP Address : Enter an address falling in  
the IP range provided by the Broadband  
Router.  
ex) 192.168.1.2~254,  
192.168.0.2~254,  
192.168.XXX.2~254  
Subnet Mask : The <Subnet Mask>  
of the Broadband Router will be the  
<Subnet Mask> of the camera.  
Gateway : The <Local IP Address> of  
the Broadband Router will be the <Gateway> of the camera.  
The settings may differ depending on the connected Broadband Router model.  
M
For more information, refer to the user manual of the applicable router.  
For more information about port forwarding of the broadband router, refer to “Port Range  
Forward (Port Mapping) Setup”. (Page 60)  
If the Broadband Router has more than one camera connected  
Configure the IP related settings and the Port related settings distinctly with each other.  
ex)  
Category  
Camera #1  
Camera #2  
IP Address  
192.168.1.100  
255.255.255.0  
192.168.1.1  
192.168.1.101  
255.255.255.0  
192.168.1.1  
IP related settings  
Subnet Mask  
Gateway  
HTTP Port  
VNP Port  
8080  
4520  
8081  
4521  
Port related settings  
If the <HTTP Port> is set other than 80, you must provide the <Port> number in the address bar  
of the Internet browser before you can access the camera.  
ex) http://IP address : HTTP Port  
M
http://192.168.1.100:8080  
English _57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
Auto Network Setup  
Run <IP Installer_v2.XX.exe> to display the camera search list.  
At the initial startup, both [Auto Set] and [Manual Set] will be grayed out.  
For cameras found with the IPv6 setting, these buttons will be grayed out as the cameras do not  
M
support this function.  
1. Select a camera in the search list.  
Check the MAC address of the camera  
on the cameras label.  
Both the [Auto Set] and [Manual Set]  
buttons will be activated.  
2. Click [Auto Set].  
The Auto Setting dialog appears.  
The <IP Address>, <Subnet Mask>,  
and <Gateway> will be set automatically.  
3. Enter the password.  
Enter the password of “admin” account,  
which was used to access the camera.  
The default password is “4321”.  
The default password can be exposed to  
J
a hacking thread so it is recommended to  
change the password after installing the  
product.  
Note that the security and other related  
issues caused by the unchanged  
password shall be responsible for the  
user.  
If you want to change the password, refer to “Administrator password change” of the user  
setup. (page 118)  
4. Click [OK].  
Auto network setup will be completed.  
58_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DYNAMIC IP SETUP  
Dynamic IP Environment Setup  
Example of the Dynamic IP environment  
- If a Broadband Router, with cameras connected, is assigned an IP address by the  
DHCP server  
- If connecting the camera directly to modem using the DHCP protocols  
- If IPs are assigned by the internal DHCP server via the LAN  
Checking the Dynamic IP  
1. Run the IP Installer on the users local  
computer.  
Cameras allocated with <Dynamic IP>  
address are shown in the list.  
2. Select a camera from the search result.  
3. Click the [Manual Set] button and  
check the cameras <Dynamic IP>  
address.  
If you uncheck <DHCP>, you can  
change IP to <Static>.  
English _59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
PORT RANGE FORWARD (PORT MAPPING) SETUP  
If you have installed a Broadband Router with a camera connected, you must set the port range  
forwarding on the Broadband Router so that a remote PC can access the camera in it.  
Manual Port Range Forwarding  
1. From the Setup menu of the Broadband  
Router, select <Applications &  
Gaming> - <Port Range Forward>.  
For setting the port range forward for  
a third-party Broadband Router, refer  
to the user guide of that Broadband  
Router.  
2. Select <TCP> and <UDP Port>  
for each connected camera to the  
Broadband Router.  
Each port number for the Broadband  
Router should match that specified in  
<Setup> - <Network> - <Port> from  
the cameras web viewer menu.  
3. When done, click [Save Settings].  
Your settings will be saved.  
Above sample instructions are based on the CISCO’s Broadband Router.  
M
The settings may differ depending on the connected Broadband Router model.  
For more information, refer to the user manual of the applicable router.  
60_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting up Port Range Forward for several network cameras  
When several network cameras are connected to one Broadband Router device, you  
should forward the TCP 943 port of the router to the TCP 943 port of a connected camera.  
If you don't set properly the TCP 943 port of the router, you cannot get any video stream from the  
J
web page of the camera.  
TCP 943 port is a port for the Silverlight policy server of a camera.  
You can set a rule of Port Forwarding on the Broadband Router device through its  
configuration web page.  
You cannot change the Silverlight policy server port of a camera.  
You can change the ports of the camera except the policy server port through its  
configuration web pages.  
When Camera1 and Camera2 are connected to a router :  
User  
Internet  
Ù
Ú
Camera1 (192.168.1.100)  
Web Server Port  
Device port  
8080  
4520  
3000  
943  
Broadband Router  
Start  
End  
943  
Protocol  
IP Address  
Ù
Ù
RTSP port  
943  
TCP  
192.168.1.100  
192.168.1.100  
192.168.1.101  
192.168.1.100  
192.168.1.101  
192.168.1.100  
192.168.1.101  
Policy server port  
3000  
3001  
4520  
4521  
8080  
8081  
3000  
3001  
4520  
4521  
8080  
8081  
TCP/UDP  
TCP/UDP  
TCP/UDP  
TCP/UDP  
TCP/UDP  
TCP/UDP  
Camera2 (192.168.1.101)  
Web Server Port  
Device port  
8081  
4521  
3001  
943  
RTSP port  
Policy server port  
English _61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network connection and setup  
CONNECTING TO THE CAMERA FROM A SHARED LOCAL PC  
1. Run the IP Installer.  
It will scan for connected cameras and  
display them as a list.  
2. Double-click a camera to access.  
The Internet browser starts and  
connects to the camera.  
Access to the camera can also be gained by typing the camera's IP address in the address bar of  
M
the Internet browser.  
CONNECTING TO THE CAMERA FROM A REMOTE PC VIA  
THE INTERNET  
Since using the IP Installer on a remote computer that is not in the Broadband Router’s network  
cluster is not allowed, users can access cameras within a Broadband Router’s network by using  
the camera’s DDNS URL.  
1. Before you can access a camera in the Broadband Router network, you should have  
set the port range forward for the Broadband Router.  
2. From the remote PC, launch the Internet browser and type the DDNS URL address  
of the camera, or the IP address of the Broadband Router in the address bar.  
ex) http://www.samsungipolis.com/[Product ID]  
For registering the DDNS settings, refer to “Registering with DDNS”. (page 94)  
M
62_ network connection and setup  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
CONNECTING TO THE CAMERA  
Normally, you would  
1. Launch the Internet browser.  
2. Type the IP address of the camera in  
the address bar.  
ex) IP address (IPv4) : 192.168.1.100  
http://192.168.1.100  
- the Login dialog should appear.  
IP address (IPv6) : 2001:230:abcd:  
ffff:0000:0000:ffff:1111  
http://[2001:230:abcd:ffff:0000  
:0000:ffff:1111] - the Login dialog  
should appear.  
If the HTTP port is other than 80  
1. Launch the Internet browser.  
2. Type the IP address and HTTP port number of the camera in the address bar.  
ex) IP address : 192.168.1.100:HTTP Port number(8080)  
http://192.168.1.100:8080 - the Login dialog should appear.  
Using URL  
1. Launch the Internet browser.  
2. Type the DDNS URL of the camera in the address bar.  
ex) URL address : http://www.samsungipolis.com/[Product ID]  
- the Login dialog should appear.  
English _63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
To check the DDNS address  
If the camera is connected directly to the DHCP cable modem, DSL modem, or PPPoE  
modem, the IP address of your network will be changed each time you try to connect to  
the ISP (Internet Service Provider) server.  
If this is the case, you will not be informed of the IP address changed by DDNS.  
Once you register a dynamic IP-based device with the DDNS server, you can easily check  
the changed IP when you try to access the device.  
To register your device to the <DDNS> server, visit www.samsungipolis.com and register  
your device first, and then set the Web Viewer’s <Network> - <DDNS> to <Samsung  
DDNS>, as well as providing <Product ID> that had been used for DDNS registration.  
LOGIN  
Whenever you access the camera, the login window appears.  
Enter the User ID and password to access the camera.  
1. Enter “admin” in the <User Name>  
input box.  
The administrator ID, “admin”, is fixed  
and can not be changed.  
2. Enter “4321” in the <Password> input  
box.  
If the password is changed, enter the  
changed password instead.  
3. Click [OK].  
If you have logged in successfully, you  
will the Live Viewer screen.  
The default user ID is “admin”, and the  
M
default password is “4321”.  
For security purposes, ensure that you change the password in <System> - <User>.  
The default password can be exposed to a hacking thread so it is recommended to change the  
password after installing the product.  
Note that the security and other related issues caused by the unchanged password shall be  
responsible for the user.  
If you check the “Remember my password” option when your input is done, in future you will be  
logged in automatically without being prompted to enter the login information.  
You will experience the best video quality if the screen size is 100%. Reducing the ratio may cut  
J
the image on the borders.  
64_ web viewer  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INSTALLING SILVERLIGHT RUNTIME  
If your PC has not installed Silverlight Runtime or has just installed an old runtime version, you will  
be redirected to the Silverlight Runtime installation page automatically when accessing the web  
viewer.  
To install on Windows OS  
1. Click <Click Here>.  
2. When the file download dialog pops up,  
click <Run>.  
3. When the download is completed, click  
<Run>.  
4. The Silverlight Runtime installation page  
will be displayed. <Install now> to  
proceed with the installation.  
English _65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
5. When done, click <Close>.  
To install on MAC OS  
1. Run the file trailing with “.dmg”.  
2. Run the install package file automatically created, ending  
with “.pkg”.  
3. Click <Continue>.  
66_ web viewer  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. Select your language on the language  
selection screen, and click <Continue>.  
5. Click <Agree>.  
6. Click <Install>.  
English _67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
7. Enter the password of the account  
currently logged in, and click <Install  
Software> and continue.  
8. Once completed, click <Close>.  
68_ web viewer  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INSTALLING STW WebViewer PLUGIN  
If connecting to a camera for the first time, you will see the installation message. Then, install the  
required WebViewer Plugin to access the camera and control the video from it in real time.  
Microsoft Visual C++ 2010 Redistribute Package should be installed on the PC before you can  
M
install the Web viewer plug-in. If Visual Studio 2010 is not installed yet, you will see the error  
message of “There is no VC++ 2010 runtime installed. Please install the runtime library.” Run the  
vcredist_x86.exe file which can be found from Samsung website at www.samsungcctv.com or the  
provided installation CD. The vcredist_x86.exe file is installer program of Microsoft’s Visual Studio  
2010 redistributable package for 32-bit operating systems.  
1. When accessing the start screen of  
the monitoring page, click the yellow  
warning message in the top of the  
page.  
2. Click <Run Add-on>.  
3. The security warning popup appears,  
click [Run].  
4. When the Web viewer plug-in is  
installed properly, you will see the live  
screen displayed.  
English _69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
USING THE LIVE SCREEN  
a
b
c
d
e
f
g
h
i
j
k
l
Item  
Description  
Monitoring  
Playback  
Setup  
Move to the monitoring screen.  
a
b
c
Switch to the monitoring screen that plays recording data in the SD memory.  
Move to the Setup screen.  
Displays the Live video on the screen.  
You can use the mouse wheel to activate the digital zooming in Viewer screen.  
Viewer Screen  
d
You can select a profile type in <Video profile> under the <Video & Audio> setup  
menu.  
Profile type  
e
When the Web Viewer is connected, the profile information currently using is  
displayed.  
Screen  
The video size of the camera will switch to as big as the Web browser.  
f
g
Optimization  
Regardless of the resolution setup configured in the camera, it sets the resolution to  
640x480. Press it again to switch back to the default resolution.  
Fix the resolution  
70_ web viewer  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Full Screen  
Description  
Switch the current video to the maximum size of the monitor.  
h
i
j
k
l
Capture  
Saves the snapshot as an image file in the .bmp or .jpg format.  
Enable/disable audio and microphone, and controls volume.  
Activate the Alarm Out port.  
Audio/Microphone  
Control  
Alarm output  
Hide the context  
The left-corner context menu will disappear but only the menu icon.  
menu  
To capture the snapshot  
1. Click [Capture (  
capture.  
)] on the scene to  
The Capture dialog should appear.  
2. Confirm the save path and click [Save]  
button.  
The screenshot will be saved in the  
specified path.  
If you encounter an interrupted video  
M
when capturing the image with IE8 on a  
Windows 7-based PC, deselect “Turn On  
Protected Mode” from “Tools – Internet Options – Security”.  
To fit the full screen  
1. Click the [Full Screen (  
)] button.  
2. This will fit the Viewer to the full screen.  
3. To exit the full screen mode, press [Esc] on the keyboard.  
For the Internet Explorer and Google Chrome browser, you can switch to the full screen.  
M
English _71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
To control the audio sound  
1. Click [Audio (  
)] icon to activate audio communication.  
2. Use [  
] bar to control the volume.  
To control microphone  
1. Click [Mic (  
)] icon to activate the microphone.  
SEARCH AND PLAY BY EVENT  
1. Click the [Playback (  
)] button.  
2. Specify the start time and end time of  
your search.  
3. Select an event type for your search  
within the specified period.  
4. Click the [Event search] button.  
The search results will be displayed in  
the list.  
If more than 500 events are recorded  
M
within the search period, your search will  
be limited up to the date when the 500th event is recorded.  
For instance, if the search period is between 10th and 15th day of the month, and more than 500  
events were recorded 10th through 11th, your search will be limited up to 11th day with a total of  
500 events, and events after then (from 12th) will not be found.  
5. Select a data item to play in the search  
list.  
6. Click the [Play (  
)] button.  
7. To stop playing the video, click  
[Stop (  
)].  
8. To return to the search screen,  
click [Exit (  
)].  
72_ web viewer  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SEARCH AND PLAY BY TIME  
1. Click [Time Search (  
)].  
2. Click a desired date in the calendar.  
The video on the specified date will be  
played.  
3. If the video playback is stopped, select  
a time and click [Play (  
)].  
The video on the selected time will be  
played.  
4. While the video is being played, the  
recording time for the current video will  
be shown.  
5. Search for the video forward or backward, and control the play speed.  
-
To control the play speed  
If selecting ), the button will switch to x1, x2, x4, x8, and the play speed will  
increase accordingly.  
If selecting (, the button will switch to x8, x4, x2, x1, and the play speed will  
decrease accordingly.  
-
To control the playback direction  
If you see the ) button with the play speed displayed, the video will be played  
forward; Whereas, if you see the ( button with the play speed displayed, the video  
will be played backward.  
6. Move [Time bar (  
)] to a desired time point of the video before playing it.  
The time containing a normal recoding file will be highlighted in blue; the time with  
the event recording will be highlighted in red.  
English _73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
web viewer  
To check time information of the playing video  
1. Click the [About (  
)] button.  
2. Date and time information appears on the screen.  
To back up the searched video  
1. During playback, click [  
] on the  
scene to back up.  
The scheduling window for backup  
start and end time appears.  
2. Click [  
] button.  
The Save As window appears.  
3. Confirm the save path and click [Save]  
button.  
The screenshot will be backed up to  
the specified path.  
To play the backup video  
The backup video will be saved in .avi format. The backup video can be played with any  
media player supporting the format on your PC.  
74_ web viewer  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
SETUP  
You can configure the video & audio, network, event and system settings of the camera in the  
network.  
[
(
)]  
1. In the Live screen, click Setup  
.
2. The Setup screen appears.  
Microsoft Sliverlight 4.0 is required to be installed on the PC for setup pages that provide preview  
J
video.  
If not installed already, automatically moves to the Sliverlight setup.  
VIDEO & AUDIO SETUP  
Video profile  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
2. Click <Video profile>.  
3. Set the <Megapixel Mode>.  
Changing the mode selection displays  
a confirmation message regarding the  
resetting the video configurations.  
Click [OK] to confirm the changing  
video settings.  
4. Set the <Video profile connection  
policy>.  
Keep connection when profile  
setting is changed: Changing profile  
properties that is used by existing  
connection does not affect such  
connection and remains with old  
profile setup.  
If not selected, changing a profile  
used by an existing connection  
resets such connection.  
5. Select each profile properties.  
English _75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
6. Click the input box of each item and enter / select a desired value.  
The context menu may differ depending on the selected codec type.  
Default profile : If no profile is selected when using the Web Viewer, the default  
video profile is applied.  
E-mail/FTP profile : Video profile to be transferred to the specified email or FTP  
site.  
Only the MJPEG codec can be set as the E-mail/FTP profile.  
Record profile : This is the profile that is applied to video recording.  
Audio-In : Sets whether to use audio for video recordings.  
7. According to your situation, set ATC  
(Auto Transmit Control) mode.  
ATC mode : It adjusts the video  
properties according to the variance  
in the network bandwidth, controlling the bit rate. Adjusting the bit rate depends  
on the ATC mode.  
-
-
Control framerate : Reduce the frame rate if the network bandwidth drops down.  
Control compression : Control the compression rate if the network bandwidth  
drops down.  
Compression adjustment can cause deterioration of the image quality.  
If <Bitrate control> is set to <CBR>, the encoding priority according to the ATC mode will be  
fixed as below:  
Bitrate control / ATC mode  
CBR  
Control framerate  
Framerate  
Control compression  
Compression  
ATC sensitivity : Affect the transfer rate according to the variance in the network  
bandwidth.  
The transfer rate will be adjusted to the fastest if the bandwidth is <Very high>,  
and adjusted to the latest if the bandwidth is <Very low>.  
ATC limit : If the quality or frame rate is adjusted, the property will be changed to  
the applied value (%) against the previous setting value (100%).  
Note that if you reduce the property value too much, you may encounter flickering  
on the screen. So it is advisable to adjust the value within the threshold.  
It is recommended to apply ATC control only for cameras supporting ATC.  
J
Set the ATC sensitivity to <Very low> in a network environment with high variance in the network  
bandwidth.  
If the network connection is unstable, you may encounter flickering on the screen.  
8. When done, click [Apply (  
)].  
76_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To add a video profile  
You can add as many codecs as necessary so that a variety of profiles can be applied  
according to the recording condition.  
1. Select one from the <Video profile> options.  
2. Provide the name and select a codec.  
3. Specify the conditions under which the codec will be applied.  
4. Specify the details of the selected codec including resolution and frame rate.  
Click <Advanced> to display the context menu.  
Resolution : Set the video size of the H.264 and MJPEG files.  
Framerate : Specify the frame rate.  
Compression : Specify the compression rate of the video.  
Maximum bitrate : Specify the maximum bit rate of the video.  
As the bit rate can be adjusted limitedly according to the resolution, frame rate and screen  
J
complexity, the actual bit rate can be greater than the maximum bit rate. So you must  
consider the use conditions when setting the value.  
Bitrate control : You can select one from constant bit rate and variable bit rate for  
compression. Constant bit rate (CBR) varies the video quality and fixes network  
transfer bit rate, while variable bit rate emphasizes the quality by varying network  
transfer bit rate.  
Encoding priority : You can set the video transfer method to Framerate or  
Compression.  
GOV length : Select a GOV length between 1 and 15.  
Profile : You can select the H.264 profiling method.  
Entropy coding : Reduce the possible compression loss due to encoding.  
Smart codec : Specify the use of Smart codec.  
The Smart Codec will be active only if the codec is of H.264 and the compression system is  
M
CBR.  
Multicast(SVNP) : Specify the use of the SVNP protocol.  
- IP address : Enter an IPv4 address with which you can connect to the IPv4 network.  
- Port : Specify the video communication port.  
- TTL : Set the TTL for the SVNP packet.  
Multicast(RTP) : Specify the use of the RTP protocol.  
- IP address : Enter an IPv4 address with which you can connect to the IPv4  
network.  
- Port : Specify the video communication port.  
- TTL : You can set the TTL for the RTP packet.  
English _77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
What is GOV length?  
GOV(Group of Video object planes) is a set of video frames for H.264 compression,  
indicating a collection of frames from the initial I-Frame (key frame) to the next I-Frame.  
GOV consists of 2 kinds of frames: I-Frame and P-Frame.  
I-Frame is the basic frame for the compression, also known as Key Frame, which contains  
one complete image data. P-Frame contains only the data that has changed from the  
preceding I-Frame.  
You can specify a value between 1 and 15 for the H.264 CODEC.  
Video setup  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
2. Click <Video setup>.  
3. Select a <Video source> mode.  
Flip mode : Turn upside down  
the image that is captured by the  
camera.  
Mirror mode : Flip horizontal the  
image that is captured by the  
camera.  
4. Select the video type.  
5. Specify the privacy zone.  
6. When done, click [Apply (  
)].  
78_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To set the privacy zone  
You can specify a certain area of the camera video to be protected for your privacy.  
1. Set it to <On>.  
2. When done, click [Apply (  
)].  
3. Select the type and color masking of  
desired privacy area.  
Rectangle : Place the cursor at a  
point in the video and drag it to  
whatever you need.  
You can overlap rectangles for  
privacy area setup.  
Quadrilateral : Select 4 vertices (forming a quadrilateral) on the video.  
4. Click on the video screen and drag to set the desired area.  
5. Provide a name and press [OK].  
6. If you want to delete an area in the list, select one and click [Delete (  
)].  
Audio setup  
You can configure the I/O settings of the audio source from the camera.  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
2. Click <Audio setup>.  
3. Set the audio input value.  
Source : Sets the audio input.  
-
-
Line : Line In audio input.  
External microphone : 3.5mm  
jack type, powered active external  
microphone.  
-
Internal microphone : Microphone that is built-in in the camera.  
(Only for SNB-7002)  
Apply power to Ext. Mic. : If the external microphone connected has no separate  
power supply, check this option to set camera to supply power to the connected  
external microphone. The option is enabled if <External microphone> is  
selected.  
English _79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Codec : Sets the codec to be used.  
-
G.711 : A audio codec standard, it uses 64 Kbps PCM (Pulse Code Modulation)  
encoding.  
ITU standard audio codec that is adequate for digital voice transfer in PSTN  
network or through a PBX.  
-
G.726 : ITU standard audio codec applying ADPCM (Adaptive Differential Pulse  
Code Modulation) for variable bit rates of 40/32/24/16 Kbps to 64 Kbps PCM  
encoding.  
Bitrate : Set the bit rate to differentiate compression ratio if using G.726 codec.  
Gain : Sets the input audio gain.  
4. Set the audio output level.  
Enable : Sets whether to use audio output.  
Gain : Sets the output audio gain.  
5. When done, click [Apply (  
)].  
Camera setup  
You can change the camera settings according to the environment where the camera is  
located.  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
2. Click <Camera setup>.  
3. Configure the settings as necessary of :  
SSDR, White balance, Backlight,  
Exposure, Special, OSD, Time OSD  
4. When done, click [Apply (  
)].  
)]  
If a certain time (timeout: 240s) is elapsed with  
your not pressing the [Apply (  
button after changing the settings, your  
changes will not be applied.  
80_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SSDR (Samsung Super Dynamic Range) Setup  
In a scene where the difference between bright and dark is severe, you can increase the  
brightness of the dark area alone to regulate the overall brightness.  
1. Select <SSDR>.  
2. Set <Mode> to <On>.  
3. Configure the <Level> and <D-Range>  
settings as necessary.  
Level : Adjust the level of the  
dynamic range.  
D-Range : Select the amplitude area of the dynamic range.  
White balance Setup  
You can correct the image colors based on white under any lighting conditions.  
1. Select <White balance>.  
2. Select <Mode>.  
ATW : Corrects the colors of the  
camera video automatically.  
Manual : You can adjust the red and  
blue gains of the camera video manually.  
AWC : Corrects the colors of the camera video to be optimized to the current  
lighting condition and screen mode.  
To obtain the optimal condition for the current lighting, put the focus of the camera  
to a white paper and press the [AWC Set] button. If the lighting environment is  
changed, you should readjust the settings accordingly.  
Outdoor : Automatically corrects the video colors of the camera to be optimized  
to the outdoor environment.  
Indoor : Automatically corrects the video colors of the camera to be optimized to  
the indoor environment.  
In AWC mode, click the [AWC Set] button if you want to keep the white balance level of the  
M
J
current image.  
The white balancing may not work properly in the following conditions:  
If this is the case, switch to AWC mode.  
If the surrounding condition of the object is out of the temperature correction range  
ex) Clear sky, sunset  
-
If the surrounding of the object is dark  
-
-
If the focus of the camera directly faces the florescent lighting or if the camera is installed in a  
place of variable illumination, the white balancing operation may be unstable.  
English _81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
BLC Setup  
You can specify a desired area on the video manually and set the area to be displayed  
more clearly.  
1. Select <Backlight>.  
2. Set <Mode> to <BLC>.  
3. Set <BLC level>.  
You can change the level to adjust the  
brightness of the monitoring area.  
4. Set the <Top, Bottom, Left, Right>  
levels to specify the target area.  
HLC (Highlight Compensation) Setup  
When a strong light such as streetlamp or headlight faces forward to the camera, you can  
mask that exposed area in order to protect it from being saturated.  
1. Select <Backlight>.  
2. Set <Mode> to <HLC>.  
3. Set the <HLC level> and the <Mask  
tone>.  
HLC level : Adjust the brightness  
level so as to remove the incoming  
highlight from a specific condition.  
Mask tone : Adjust the mask tone of  
the highlighted area.  
At night operation, this function will be activated only if the incoming highlight exceeds a certain  
M
area in a low contrast environment.  
At night, HLC will not function if the scene is either too bright or too dark.  
82_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WDR Setup  
It displays a sharp image of the objects in a scene where both bright and dark areas exist.  
1. Select <Backlight>.  
2. Set <Mode> to <WDR>.  
3. Specify the <WDR level>.  
If applied with WDR, noise may be found  
M
on the border between the brighter and  
darker areas.  
Ex)  
<WDR OFF>  
<WDR ON>  
Exposure Setup (SNB-7002)  
You can adjust the exposure level of the camera.  
1. Select <Exposure>.  
2. Select each item and set it properly.  
Brightness : Adjust the screen  
brightness.  
Shutter mode : Adjust the electronic  
shutter of the camera.  
- ESC (Electronic shutter control) :  
Adjust the shutter speed  
automatically according to the  
ambient brightness.  
This will be activated if <Lens> is set to <Manual>.  
English _83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
- Manual : Adjust the shutter speed of the camera manually.  
You can select one between 1/30 and 1/12000sec in 2 mega mode, and select one between  
1/20 and 1/12000sec in 3 mega mode.  
- A.FLK (Anti flicker) : Select this feature if you encounter a flickering screen due  
to a frequency mismatch with the ambient lighting.  
Shutter speed : Control the shutter speed manually.  
SSNR3 : Specify the use of noise reduction.  
SSNR3 level : Adjust the noise reduction level.  
Sens-up mode : Automatically senses the darkness level at night or in a low  
contrast scene and extends the accumulation time accordingly for a bright and  
sharp image.  
If you set the shutter mode to Manual/A.FLK, SENS-UP mode will be deactivated.  
The greater the Sens-Up factor is, the brighter the screen becomes but it may result in an  
afterimage or video delay.  
Sens-up limit : Set the work condition to Auto mode in a low contrast scene.  
Lens : Select to set the lens mode of the camera to Manual or Auto.  
- DC(Auto) : Select this if you use the DC lens. Only the iris is adjusted  
automatically, but the focus is not controlled automatically.  
- Manual : Select this if you use a lens on which you adjust the iris and focus  
manually.  
AGC mode : Select AGC Control mode.  
Adjust the gain value of the video (that, in particular, was recorded at a low  
contrast scene and had a lower brightness level than normal) to control the video  
brightness.  
Exposure Setup (SND-7082/SND-7082F/SNV-7082)  
You can adjust the exposure level of the camera.  
1. Select <Exposure>.  
2. Select each item and set it properly.  
Brightness : Adjust the screen  
brightness.  
Shutter mode : Adjust the electronic  
shutter of the camera.  
- ESC (Electronic shutter control) :  
Adjust the shutter speed  
automatically according to the  
ambient brightness.  
This will be activated if <Iris> is set to <Manual>.  
84_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
- Manual : Adjust the shutter speed of the camera manually.  
You can select one between 1/30 and 1/12000sec in 2 mega mode, and select one between  
1/20 and 1/12000sec in 3 mega mode.  
- A.FLK (Anti flicker) : Select this feature if you encounter a flickering screen due  
to a frequency mismatch with the ambient lighting.  
Shutter speed : Control the shutter speed manually.  
SSNR3 : Specify the use of noise reduction.  
SSNR3 level : Adjust the noise reduction level.  
Sens-up mode : Automatically senses the darkness level at night or in a low  
contrast scene and extends the accumulation time accordingly for a bright and  
sharp image.  
If you set the shutter mode to Manual/A.FLK, SENS-UP mode will be deactivated.  
The greater the Sens-Up factor is, the brighter the screen becomes but it may result in an  
afterimage or video delay.  
Sens-up limit : Set the work condition to Auto mode in a low contrast scene.  
Iris : You can set the camera iris to Auto or Manual to your preference.  
- Auto : Automatically sets the iris adaptively to the ambient lighting and shutter  
speed.  
- Manual : Sets the iris to its maximum aperture.  
AGC mode : Select AGC Control mode.  
Adjust the gain value of the video (that, in particular, was recorded at a low  
contrast scene and had a lower brightness level than normal) to control the video  
brightness.  
Special Setup (SNB-7002)  
1. Select <Special>.  
2. Select each item and set it properly.  
Day & night : You can switch the  
mode to adjust the black and white  
level as well as the colors.  
- Color : Always displays the video in  
colors.  
- B/W : Always displays the video in  
black and white.  
- Auto : Displays in color mode during normal daytime and switches to black and  
white mode in a low contrast scene at night.  
If you set the AGC mode to <Off> from <Exposure>, the AUTO DAY/NIGHT mode will be  
disabled accordingly.  
- External B/W : Control the image modes of Color and B/W when an external IR  
is synchronized via the Alarm In port.  
English _85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Dwell time : This is the time while each applicable lighting condition is kept in  
order to enable the switch between day and night modes.  
Duration : Specify the time interval of lighting at which the sequence operation is  
triggered.  
Simple focus after D/N : When switching day/night mode, automatically runs  
focus adjustment.  
When using IR lens with the camera, set this to <Off>.  
Setting <Simple focus after D/N> option may cause false focus adjustment under a specific  
M
condition. For further details, refer to “Focus setup”. (Page 89)  
Sharpness mode : Adjust the overall sharpness of the image.  
If selecting <On>, you can adjust the sharpness of the image.  
Sharpness level : The higher the level is, the sharper and clearer the outline of the  
image becomes.  
Gamma : Adjust the contrast of the image.  
Color level : Adjust the color level of the image.  
Alarm in : Set the image to Color or B/W depending on the Open/Close state of  
the alarm sensor.  
If the Day & Night mode is set to Externel B/W, the alarm-in function of the event-alarm input page  
will be disabled.  
Special Setup (SND-7082/SND-7082F/SNV-7082)  
1. Select <Special>.  
2. Select each item and set it properly.  
Day & night : You can switch the  
mode to adjust the black and white  
level as well as the colors.  
- Color : Always displays the video in  
colors.  
- B/W : Always displays the video in  
black and white.  
- Auto : Displays in color mode  
during normal daytime and switches to black and white mode in a low contrast  
scene at night.  
If you set the AGC mode to <Off> from <Exposure>, the AUTO DAY/NIGHT mode will be  
disabled accordingly.  
- External B/W : Control the image modes of Color and B/W when an external IR  
is synchronized via the Alarm In port.  
86_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Dwell time : This is the time while each applicable lighting condition is kept in  
order to enable the switch between day and night modes.  
Duration : Specify the time interval of lighting at which the sequence operation is  
triggered.  
Sharpness mode : Adjust the overall sharpness of the image.  
If selecting <On>, you can adjust the sharpness of the image.  
Sharpness level : The higher the level is, the sharper and clearer the outline of the  
image becomes.  
Gamma : Adjust the contrast of the image.  
Color level : Adjust the color level of the image.  
Alarm in : Set the image to Color or B/W depending on the Open/Close state of  
the alarm sensor.  
If the Day & Night mode is set to Externel B/W, the alarm-in function of the event-alarm input page  
will be disabled.  
OSD Setup  
1. Select <OSD>.  
2. Select each item and set it properly.  
Camera title : Specify whether or  
not to display the camera title on the  
screen.  
You can enter up to 15 characters for the title.  
Camera title position X, Y : Specify the coordinates where the camera title is  
displayed on the screen.  
Time OSD Setup  
1. Select <Time OSD>.  
2. Select each item and set it properly.  
Time display : Specify the use of time  
display on the screen.  
Date format : Specify the date format  
that will be displayed on the screen.  
Time position display X, Y : Specify the position of time display on the screen.  
Display weekday : Specify the use of date display date on the screen.  
English _87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Smart codec setup  
Set a desired area of the video incoming from the camera as ROI area and specify the  
detection sensitivity for the area.  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
2. Click <Smart codec setup>.  
3. Set the image quality.  
The ROI area will be displayed in the  
specified quality.  
4. Select a desired area with the mouse  
pointer and drag it as much as you  
want.  
You can specify up to 5 distinct areas.  
5. To cancel all the settings for the area, click the [Clear (  
)] button.  
6. When done, click [Apply (  
)].  
The Smart codec will not be active if it is set to <Off> in <Video profile>. (page 75)  
J
88_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Focus setup (SNB-7002)  
You can adjust the focus of video image.  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
.
2. Click <Focus setup>  
3. Set the focus. (How to use the Simple  
Focus)  
1) Focus initialize : Restores the focus  
adjustment to the default flange back  
position.  
2) Focus (Adjust Lens) : Manually adjusts  
the Lens focus (Far <-> Near) and  
ensure the image clear.  
3) Simple focus : Click [  
] button to fit the focus automatically.  
The Simple focus mode may not fit correctly in the following cases:  
J
Sudden change to the object in Simple focus mode (sudden movement, appearance or  
-
disappearance)  
Radical change to the brightness in Simple focus mode  
Image of a low contrast  
-
-
-
If the camera is exposed to a strong light source in the front or surroundings  
In case the focus is inappropriate apart from mentioned above, use [  
,
,
,
,
,
] button to manually adjust the focus.  
In a situation where Simple focus is hardly applied, try to use the manual focus mode.  
English _89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Focus setup (SND-7082/SND-7082F/SNV-7082)  
You can adjust the focus and zoom ratio of video image.  
1. From the Setup menu, select the  
<Video & Audio (  
)> tab.  
.
2. Click <Focus setup>  
Set the focus and zoom.  
3.  
Focus : Manually adjusts the lens  
focus (Far <-> Near).  
Zoom : Manually adjusts the zooming  
(Wide <-> Tele).  
Simple focus : Click [  
] button to fit  
the focus automatically.  
The Simple focus mode may not fit correctly in the following cases:  
J
Sudden change to the object in Simple focus mode (sudden movement, appearance or  
-
disappearance)  
Radical change to the brightness in Simple focus mode  
Image of a low contrast  
-
-
-
If the camera is exposed to a strong light source in the front or surroundings  
In case the focus is inappropriate apart from mentioned above, use [  
,
,
,
,
,
] button to manually adjust the focus.  
In a situation where Simple focus is hardly applied, try to use the manual focus mode.  
90_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
NETWORK SETUP  
Interface  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <Interface>.  
3. Set the <Interface> and <IPv6 setup>  
as necessary.  
IP type : Select an IP connection type.  
- Manual : Specify the IP address,  
Subnet mask, Gateway, DNS1,  
and DNS2.  
- DHCP : Specify the DNS1 and  
DNS2.  
- PPPoE : Specify the DNS1, DNS2, ID and Password.  
If you set it to <Manual>, you should specify the IP, Subnet mask, Gateway, DNS 1 & 2 manually.  
MAC address : Shows the MAC address.  
IP address : Displays the current IP address.  
Subnet mask : Displays the <Subnet mask> for the set IP.  
Gateway : Displays the <Gateway> for the set IP.  
4. Set the <IPv6 setup>.  
Set to <Use> to use IPv6 address.  
DNS1/DNS2 : Displays the DNS(Domain Name Service) server address.  
Default : Use the default IPv6 address.  
DHCP : Display and use the IPv6 address obtained from the DHCP server.  
Manual : Enter IP address and gateway manually and use it.  
5. When done, click [Apply (  
)].  
The IP addressing system will be defaulted to DHCP. If no DHCP server is found, the previous  
J
settings will be restored automatically.  
Once completed with editing, click [Apply (  
)] to apply changes and the browser exits.  
After a while, connect again with the changed IP.  
English _91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Port  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <Port>.  
3. Type in each item in the Port menu as  
necessary.  
Neither the port range between 0 and 1023  
nor port 3702 is available.  
HTTP port : HTTP port used to  
access the camera via the web browser.  
The default is 80(TCP).  
Setting the HTTP port for Safari and Google Chrome browsers to 65535 is not allowed by security  
policy.  
Device port : Set a port used to transfer video signals with the Samsung  
protocols.  
RTSP port : Used to transfer videos in the RTSP mode; the default is 554.  
Web streaming port : Used to transfer videos to the Web Viewer; the default is 4520.  
Silverlight policy port : Silverlight is used to permit to acquire a network  
connection; the default is 943.  
If changed the HTTP port, the browser exits.  
M
Afterwards, address should contain the newly assigned HTTP port trailing the IP.  
ex) IP address: 192.168.1.100, HTTP port : Assigned 8080 http://192.168.1.100:8080  
(If HTTP port is set to 80, no need to specify the port number)  
The port range of the Web Streaming is between 4502 and 4534. If the Device port is with this  
effective range, the Web Streaming port should be specified the same as the Device port.  
You cannot change the Web Streaming/Silverlight policy server port of a camera.  
4. When done, click [Apply (  
)].  
92_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DDNS  
DDNS is an abbreviation of Dynamic Domain Name Service that converts the IP address of  
a camera into a general Host Name so that the user can easily remember it.  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <DDNS>.  
3. Select the <DDNS> connection type.  
4. Type in the DDNS items according to  
the selected type.  
Samsung DDNS : Select this if you  
use the DDNS server provided by  
Samsung Techwin.  
- Product ID : Enter the product ID that is registered with the Samsung DDNS  
service.  
- Quick connect : It sets port forwarding automatically when used with a UPnP  
(Universal Plug and Play) supporting router.  
Public DDNS : Select one of provided public DDNS servers when you use a public  
DDNS server.  
- Service : Select desired public DDNS service server.  
- Host name : Enter the name of the host that is registered with the DDNS server.  
- User name : Enter the user name for the DDNS service.  
- Password : Enter the password for the DDNS service.  
5. When done, click [Apply (  
)].  
If selected <Quick connect>, be sure to select Samsung DDNS service.  
J
English _93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Registering with DDNS  
To register your product with the Samsung DDNS  
1. Visit the iPOLiS web site  
(www.samsungipolis.com) and sign in  
with a registered account.  
2. From the top menu bar, select <DDNS  
SERVICE> - <MY DDNS>.  
3. Click [PRODUCT REGISTRATION].  
4. Enter the product ID.  
You must perform the duplicate check for the  
ID that you entered.  
5. Select a <CLASSIFICATION> and  
specify the <MODEL NUMBER>.  
6. Specify the product location with a  
description if necessary.  
7. Click [REGISTRATION].  
The product will be added to the  
product list that you can check.  
94_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To connect to the Samsung DDNS in camera setup  
1. From the DDNS setup page, set  
<DDNS> to <Samsung DDNS>.  
2. Provide the <Product ID> that you  
registered product ID with the DDNS  
site.  
3. Click [Apply (  
)].  
When the connection is successfully  
made, you will see the message of  
<(Success)> on the screen.  
Configuring public DDNS in Camera Settings  
1. Open the DDNS settings page and select <Public DDNS> for <DDNS>.  
2. Enter the corresponding sites host name, user name and password.  
3. Click [Apply (  
)] button.  
If the connection properly establishes, <(Success)> appears.  
4. When done, click [Apply (  
)].  
To use DDNS service properly, both DDNS setup and the router’s port forwarding setup are  
required.  
M
For port forwarding setup, refer to “Port Range Forward (Port Mapping) Setup” (page 60)  
English _95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
IP filtering  
You can create a list of IPs that you want to grant or deny access to them.  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <IP filtering>.  
3. Select <Filtering type>.  
Deny : If selecting this, access from  
those IPs that are added to the  
filtering will be restricted.  
Allow : If selecting this, access from  
only those IPs that are added to the  
filtering will be accepted.  
4. Click the [Add (  
)] button.  
The IP list will be created.  
5. Provide the IP that you want to grant or deny access from.  
When you enter an IP address and a Prefix, the list of IP addresses available will  
appear in the right-side filter range column.  
If selected <Allow> for IP Filtering and <IPv6 setup> of <Interface> is set to <Use>, both IPv4  
M
and IPv6 addresses of the computer currently configuring should be assigned.  
The IP address of the computer used for the current setup cannot be added to <Deny>, it should  
be added to <Allow>.  
Only the IP addresses that are set to <Use> will be displayed in the filter column.  
6. Select an IP to delete from the list.  
Click the [Delete (  
)] button.  
7. When done, click [Apply (  
)].  
96_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SSL  
You can select a secure connection system or install the public certificate for this purpose.  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <SSL>.  
3. Select a secure connection system.  
To access the camera using HTTPS mode, you  
have to type the IP address for the camera in  
the form of “https://<Camera_IP>”.  
If you failed to configure the Web viewer  
settings in HTTPS mode with Internet Explorer,  
edit the Internet options as follows: <Menu Tools Internet Options Advanced Security   
Uncheck TLS 1.0, and check TLS 1.1, TLS 1.2>  
4. Search for the public certificate that you want to install on the camera.  
To install the certificate on the camera, you need to provide a certificate name (it  
can be arbitrarily assigned by the user), certificate file issued from the certification  
authority and a key file.  
The <HTTPS (Secure connection mode using the public certificate)> item will be active only if  
there exists a public certificate installed.  
5. When done, click [Apply (  
)].  
Installing the certificate  
1. Enter the certificate name.  
2. Select the certificate file to be installed and certificate key, and click [Install (  
)]  
button.  
Deleting the certificate  
1. Click [Delete (  
)] button.  
2. To delete a public certificate, you should access the network video decoder in  
the mode of <HTTP (Do not use secure connection)> or <HTTPS (Secure  
connection mode using a unique certificate)>.  
English _97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
802.1x  
When connecting network, you can choose whether using 802.1x protocol, and then install  
the certification.  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <802.1x>.  
3. Set the <IEEE 802.1x setting(EAPOL  
using EAP-TLS)>.  
Enable IEEE 802.1x : Specify the use  
of the 802.1x protocol.  
EAPOL version : Select version 1 or 2.  
ID : Enter the client certificate ID.  
Password : Enter the client private  
key password. If the key file used is not encrypted, you don’t need to enter it.  
If the connected network device does not support the 802.1x protocol, the protocol will not  
J
operate properly even if you set it.  
4. Install/remove the certificate.  
CA certificates : Select a public certificate that contains the public key.  
Client certificate : Select a public certificate that contains the client certificate key.  
Client private key : Select a public certificate that contains the client private key.  
5. When done, click [Apply (  
)].  
To install/remove 802.1x related certificates  
1. Press the [Browse (  
)] button for each item and select a certificate to install.  
2. If no certificate is installed, you will see “Not Available” appearing next to the selected  
item.  
3. Press the [Install (  
)] button to start installation with a message of “Installed”  
next to the item.  
4. Press the [Delete (  
)] button to remove the certificate.  
98_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
QoS  
You can specify the priority to secure a stable transfer rate for a specific IP.  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <QoS>.  
3. Click the [Add (  
)] button.  
The IP list will be created.  
4. Enter an IP address to which you will  
apply QoS.  
The default prefix for IPv4 is 32;  
M
For DSCP, the default is set to 63.  
Only the IP addresses that are set to <Use> can be prioritized.  
5. Select an IP to delete from the list.  
Click the [Delete (  
)] button.  
6. When done, click [Apply (  
)].  
SNMP  
With the SNMP protocols, the system or network admin can monitor the network devices  
on a remote site, and configure the environment settings.  
1. From the Setup menu, select the  
<Network (  
)> tab.  
2. Click <SNMP>.  
3. Specify the <SNMP>.  
Enable SNMP v1 : SNMP version 1  
will be active.  
Enable SNMP v2c : SNMP version 2  
will be active.  
-
Read community : Provide the  
name of the read community where you can access to the SNMP information.  
The default name is <public>.  
-
Write community : Provide the name of the write community where you can  
access to the SNMP information. The default name is <write>.  
English _99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Enable SNMP v3 : SNMP version 3 will be active.  
-
Password : Specify the default password for SNMP version 3. The default  
password is <admin4321>.  
The default password can be exposed to a hacking thread so it is recommended to change the  
password after installing the product.  
Note that the security and other related issues caused by the unchanged password shall be  
responsible for the user.  
Password should be longer than 8 characters, no more than 16 characters.  
4. When done, click [Apply (  
)].  
SNMP v3 is only able to be set when the secure connection mode is HTTPS.  
J
Refer to “SSL”. (page 97)  
EVENT SETUP  
FTP / E-mail  
You can configure the FTP/E-mail server settings so that you can transfer the images taken  
with camera to your PC if an event occurs.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <FTP / E-mail>.  
3. Select <FTP configuration> or  
<E-mail configuration> and enter /  
select a desired value.  
FTP configuration  
- Server address : Enter the IP  
address of the FTP server that you  
transfer the alarm or event images  
to.  
- ID : Enter the user ID with which  
you will log in to the FTP server.  
- Password : Enter the user account  
password for logging into the FTP server.  
- Upload directory : Specify the FTP path where you will transfer the alarm or  
event images.  
100_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
- Port : The default port of the FTP server is 21; however, you can use a different  
port number according to the FTP server settings.  
- Passive mode : Select <On> if you need to connect in passive mode due to the  
firewall or the FTP server settings.  
E-mail configuration  
- Server address : Enter the IP address of the email server that you transfer the  
alarm or event images to.  
- Use authentication : Select whether to use authorization.  
- Use SSL : Specify the use of SSL.  
- ID : Enter the user ID for logging into the email server.  
- Password : Enter the user account password for logging into the email server.  
- Port : The default port of the email server is 25; however, you can use a different  
port number according to the email server settings.  
- Recipient : Enter the address of the email recipient.  
- Sender : Enter the address of the email sender. If the sender address is  
incorrect, the email from the sender may be classified as SPAM by the email  
server and thus may not be sent.  
- Subject : Enter a subject for your email.  
- Body : Provide the text for the massage. Attach the alarm or event images to  
the email that you are preparing.  
4. When done, click [Apply (  
)].  
English _101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Storage  
You can set the record conditions or the use of recording for the SD memory, check the  
size of stored data, or format the SD memory itself.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Storage>.  
To make recording on the SD memory  
1. Check the memory cards <Free> size  
and <Total> size.  
2. If there are sufficient free space, set the  
device to <On>.  
Otherwise, check the stored data and if  
you find them not important, then click  
<Format> to format the SD memory.  
If your SD memory card writes slowly, only one frame per second will be stored.  
For a SD memory card with a large capacity, the formatting will be slowed down accordingly.  
Setting to higher options of resolution, bit rate and frame rate increases the amount of data produced.  
As the size of data grows, transferred video can be stored only at 1 fps even if you set the record  
quality to full frames.  
3. Specify the storage action.  
Record profile : Shows recording profiles codec type.  
Overwrite : If the SD memory is full, this will delete old data and store new data in  
replacement.  
Pre-alarm duration : Specify the time point before the occurrence of the alarm;  
starting from the time point, the images will be transferred. You can specify up to  
5 seconds before the occurrence of the alarm.  
Post-alarm duration : Specify the time point after the occurrence of the alarm; to  
the specified time point, the images will be transferred. You can specify up to 120  
seconds after the occurrence of the alarm.  
Normal : Make recording at a certain frame rate.  
Event : Set the recording type for a certain event that occurs.  
4. Specify the <Normal record setup>.  
Always : Always save recorded video in the SD memory card.  
If set to Always, the activation time cannot be changed.  
Only scheduled time : Records only on the specified time of the specified day of week.  
[Clear (  
)] : Reset all settings.  
5. When done, click [Apply (  
)].  
102_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Alarm input  
You can set the alarm input type, activation time, and operation mode.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Event setup>.  
3. Select <Alarm input> from <Event  
action setup>.  
4. Set whether or not to <Enable>.  
5. Specify an input device.  
Type  
- Normal open : It is normally open,  
but if it is closed, an alarm will be  
triggered.  
- Normal close : It is normally closed,  
but if it is open, an alarm will be  
triggered.  
6. Specify the <Activation time>.  
Always : Always check if an alarm occurs. It activates in operated mode when the  
alarm occurs.  
If set to <Always>, the activation time cannot be changed.  
Only scheduled time : Check if an alarm occurs at a specified day of the week for  
a specified time period. It activates in operated mode when the alarm occurs.  
[Clear (  
)] : Reset all settings.  
7. Specify an operation that will perform if an alarm occurs.  
FTP : Specify the use of FTP transfer in the alarm input setup.  
E-mail : Specify the use of email transfer in the alarm input setup.  
Record : Specify the use of recording in the alarm input setup.  
Alarm output : Select whether to set the alarm output if an alarm is incoming, and  
specify the alarm output time.  
8. When done, click [Apply (  
)].  
English _103  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Time schedule  
You can set to save the video data at a certain interval as scheduled regardless of the  
actual occurrence of the event.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Event setup>.  
3. Select <Time schedule> from <Event  
action setup>.  
4. Set whether or not to <Enable>.  
5. Specify the <Transfer interval>.  
6. Specify the <Activation time>.  
Always : Always activates in operated  
mode at the set interval.  
Only scheduled time : Periodically  
activates in operated mode at a  
specified time and date.  
7. Specify the activation conditions.  
FTP : Specify the use of the FTP transfer if an event occurs.  
8. When done, click [Apply (  
)].  
104_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Tampering detection  
You can set to detect tampering attempts and trigger events, such as sudden change  
of camera’s framing direction, blocked lens and other overall change of scenes from the  
video.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Event setup>.  
3. Select <Tampering detection> from  
<Event action setup>.  
4. Set whether or not to <Enable>.  
5. Set the tampering detection sensitivity.  
The higher the sensitivity, detects the  
minutest tampering attempts.  
6. Specify the activation time and  
activation condition.  
For more information about <Activation  
(page 103)  
time> and <Action>, refer to “Alarm input”.  
7. When done, click [Apply (  
)].  
The default tampering detection function may not work properly in the following cases:  
J
Under circumstances of simple background or low illumination and night time may lower the  
-
-
-
-
detection sensitivity.  
A severe shaking of the camera or a drastic change to the illumination can be considered a  
tampering by mistake.  
Detection of the tampering may take some time (maximum 5 seconds) right after the  
tampering was made.  
Once a tampering is detected, the camera will resume a normal operating after a certain  
stability time (approx. 5 seconds) during which no detection will be performed.  
English _105  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Motion detection / Video analytics  
Events of motion detection and video analysis can be set to trigger event signal output.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Event setup >.  
3. Select <Motion detection / Video  
analytics> from <Event action  
setup>.  
4. Set whether or not to <Enable>.  
5. According to your purpose, select from  
motion detection and intelligent video  
analysis.  
6. Set <Sensitivity>, <Size> and <Area>.  
When selected Intelligent Video  
Analysis, set <Analytics> too.  
7. Set whether to use <Detection result  
overlay>.  
When a motion is detected, its size and  
position is marked with a rectangle on  
the screen.  
Green : All targets detected as  
moving.  
Red : All targets detected as passing,  
entering or exiting.  
(Colored marking remains for 1 ~ 2  
seconds.)  
Blue: All targets detected as Appear/Disappear event.  
(Colored marking remains for 3 ~ 5 seconds.)  
8. Specify the activation time and activation condition.  
For more information about <Activation time> and <Action>, refer to “Alarm input”. (page 103)  
9. When done, click [Apply (  
)].  
106_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Motion detection and Video analytics cannot be used simultaneously.  
J
Before using, set the minimum and maximum motion sizes to suit desired motion range to be  
detected.  
Set the maximum and minimum detection size appropriately to objects to be detected.  
Detected size of an object may have difference with the actual size according to its shape.  
Up to 16 objects from the top side of the screen can be displayed.  
If camera is capturing a close object, the video analysis capability may degrade.  
In the following cases, motion detection and intelligent video analysis function may be degraded  
or cause improper detection.  
The object color or brightness is similar to the background.  
Small activities around the border area of the camera’s field of view.  
Multiple movements continue occurring at random due to a scene change, rapid lighting  
changes or other reasons.  
-
-
-
A fixed object continues moving in the same position.  
Motions of less position changing such as approaching to the camera or fading away from the  
camera.  
-
-
Moving object approaches to the camera too close  
-
-
-
-
An object hides other objects behind.  
Two or more objects overlap or one object divides in multiple portions.  
Too fast object (for a proper detection, one object should be found overlapping between  
contiguous frames).  
Reflection / blur / shadow due to a strong light such as direct sunlight, illumination, or headlamp.  
In severe snow, rain, wind or in dawn / dusk.  
-
-
English _107  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
To use Motion detection  
It detects a motion that meets all conditions specified by sensitivity, size and area.  
1. Select a motion detection mode.  
2. Select <Sensitivity> tab to set the  
sensitivity level. You can set the sensors  
sensitivity to detect a motion out of the  
background from the monitoring video.  
In a situation that definitely distinguishes  
J
objects out of backgrounds, set this to  
a low sensitivity level. For opposite case  
that is hard to distinguish objects like low  
illuminated situation, set this to a high  
level.  
3. Select <Size> tab.  
You can limit the minimum/maximum  
size of motion to be detected.  
Minimum Size : To set the minimum  
size of detected motions, select  
<Minimum Size> and then point  
and drag to the desired size on the  
screen using the mouse.  
Maximum Size : To set the maximum  
size of detected motions, select  
<Maximum Size> and then point  
and drag to the desired size on the  
screen with your mouse.  
Motions smaller than the specified minimum size or bigger than the maximum size are not  
J
detected. To avoid unintended detections caused by great and small noises, set minimum/  
maximum motion sizes appropriately in accordance to your environments.  
Note that same motions on the same location can be differently detected in their detection size;  
it is recommended to consider and include the tolerable difference when setting the minimum/  
maximum detection sizes.  
108_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. Select <Area> tab.  
You can specify an area on the screen  
to include or exclude the area to/from  
detection.  
You can specify up to 4 areas.  
Detection area: Sets the entire  
screen as excluded from detection,  
and adds specified area as motion  
detection area. Use your mouse to  
drag to specify preferred area as the  
motion detection area.  
Non detection area: Sets the entire  
screen as motion detection area, and  
excludes specified area as not to be  
detected. Use your mouse to drag  
to specify preferred area as the non  
detection area.  
5. To delete an area, right click on the  
screen to open popup context menu  
and select Delete, and [OK] button.  
All areas defined are deleted.  
J
6. When done, click [Apply (  
)].  
English _109  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
To use Video analytics  
It detects event that meets all conditions specified by sensitivity, size and area and the  
event condition rules.  
1. Select the video analysis mode.  
2. Set <Sensitivity>, <Size> and <Area>.  
For further details on settings, refer  
to “To use Motion detection”. (Page  
108~109)  
3. Select <Analytics> tab.  
4. Select the video analysis type.  
Passing, Entering/Exiting : Detects  
motions of passing, entering into or  
exiting from a virtual line specified by  
the user.  
Appearing (Disappearing) : Detects  
motions of appearing on or  
disappearing from the user-defined  
area or the entire screen area.  
5. Set the video analysis rules.  
For further details on settings, refer to  
To set the video analysis rules”.  
(page 111~112)  
6. Set whether to use <Detection result  
overlay>.  
Specified rules of virtual lines and areas  
are displayed on the monitoring page.  
7. When done, click [Apply (  
)].  
110_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To set the video analysis rules  
Passing  
1. Set the type to <Passing, Entering/  
Exiting>.  
2. Set the event rule to <Virtual line  
based rules>.  
3. On the screen, click on preferred  
starting and ending point of the virtual  
line, then a popup window appears.  
4. Select the desired rule:  
Right: Detects motions of moving  
from the left to the right, over the  
virtual line.  
Left: Detects motions of moving from  
the right to the left, over the virtual line.  
5. Click [OK].  
6. To remove a defined rule, right click on the displayed virtual line to open popup  
context menu and select [Delete] button.  
Entering/Exiting  
1. Set the type to <Passing, Entering/  
Exiting>.  
2. Set the event rule to <Defined area  
based rules>.  
3. On the screen, click four vertices to  
define detection area and a popup  
window appears.  
4. Select the desired rule:  
Entering : Detects motions of moving  
object whose center point entering  
into the defined area, from outside of  
the area.  
Exiting : Detects motions of moving object whose center point exiting from the  
defined area, from inside of the area to outside.  
5. Click [OK].  
6. To remove a defined rule, right click on the displayed side lines of the area to open  
popup context menu and select [Delete] button.  
English _111  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Appearing (Disappearing)  
1. Set the analysis type to <Appearing  
(Disappearing)>.  
2. Select the desired event rule:  
Defined area based rules : It detects  
event of appearing object that  
appears in the area and remaining  
for a certain time period while not  
passing through the area borders,  
and opposite case of disappearing of  
objects existed in the area.  
On the screen, click four vertices to  
define detection area.  
Select the [Appearing  
(Disappearing)] from the popup.  
Entire area based rules : It detects  
event of appearing object that  
appears in the entire screen and  
remaining for a certain time period,  
and opposite case of disappearing of  
objects existed in the screen.  
Right click on the screen to open  
the popup context menu and select  
[Appearing(Disappearing)].  
3. Click [OK].  
4. To remove a defined rule, right click on  
the displayed side lines of the area or  
on the screen to open popup context  
menu and select [Delete] button.  
112_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Face detection  
You can set to detect recognized face and trigger an event accordingly.  
1. From the Setup menu, select the  
<Event (  
)
>
tab.  
2. Click <Event setup>.  
Select  
from <  
.
3.  
4.  
<
Face detection  
>
Event  
.
action setup  
>
Set whether or not to  
<Enable>  
5. Select <Sensitivity> tab to set the  
sensitivity level.  
As the sensitivity grows, face detection  
becomes more close and detailed.  
6. Select <Area> tab and drag on the  
screen to define the desired detection  
area. You can specify up to 4 detection  
areas.  
Conditions for face detection are as  
M
below:  
Face detection can be applied to videos  
having the QVGA (320x240) resolution  
only.  
For detection, the face area should be  
bigger than 20~40 pixels at least.  
Up to 35 faces within one frame image can be recognized in maximum, unable to detect more.  
7. To delete a defined area, click [Clear] button while the Area tab is selected.  
8. Set whether to use <Detection result overlay>.  
When faces are detected, their positions and sizes are marked with rectangles on  
the screen.  
9. Specify the activation time and activation condition.  
For more information about <Activation time> and <Action>, refer to “Alarm input”. (page 103)  
10. When done, click [Apply (  
)].  
English _113  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Audio detection  
You can set to detect sound over the specified level and trigger an event accordingly.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Event setup>.  
Select  
from  
3.  
4.  
<Audio detection>  
<Event  
.
.
action setup>  
Set whether or not to  
<Enable>  
5. Set the audio detections sound level.  
The lower the level, the smaller the  
sound change is detected.  
6. Specify the activation time and  
activation condition.  
For more information about Activation  
(page 103)  
<
time and Action , refer to “Alarm input”.  
>
<
>
7. When done, click [Apply (  
)].  
If detected audio level is too low, set the audio input gain to a higher level in <Audio setup>.  
M
Network disconnection  
You can receive and save events of a physically disconnected network.  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Event setup>.  
Select  
from  
3.  
4.  
<Network disconnection>  
.
<Event action setup>  
Set whether or not to  
.
<Enable>  
5. Specify the activation time and  
activation condition.  
For more information about <Activation  
time> and <Action>, refer to “Alarm input”.  
(page 103)  
6. When done, click [Apply (  
)].  
114_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Alarm output setup  
1. From the Setup menu, select the  
<Event (  
)> tab.  
2. Click <Alarm output setup>.  
3. Set the cameras type of alarm output.  
If you change the alarm output type, the alarm  
out button on the monitoring page and alarm  
output type displayed on Event Setup page will  
be changed accordingly.  
Type  
-
-
Normal open : Considers “Open circuit” status of the sensor or alarm input device  
as normal, and triggers alarm event if becomes “Closed circuit” status.  
Normal close : Considers “Closed circuit” status of the sensor or alarm input device  
as normal, and triggers alarm event if becomes “Open circuit” status.  
4. Set the alarm output button.  
Mode: Sets the alarm output method.  
There is difference between operations when clicked alarm output button while disabled.  
-
Pulse : It is activated during the time period specified by the duration (switching  
interval) and then becomes inactive automatically.  
-
Active/Inactive : It maintains as activated until the user clicks the button again to  
make it inactive.  
Duration : Set the alarm duration that maintains activated if the mode is set to  
pulse, from 1 to 15 seconds.  
5. When done, click [Apply (  
)].  
English _115  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
SYSTEM SETUP  
Product information  
1. From the Setup menu, select the  
<System (  
)> tab.  
2. Click <Product information>.  
3. Check the camera information, or  
provide details according to your  
network environment.  
Model : Model name of the product.  
Serial number : Product serial number.  
Device name : Provide a device name that will be displayed on the Live screen.  
Location : Specify the location where the camera is installed.  
Description : Provide detailed  
information about the camera location.  
Memo : Provide an explanation about the camera for better understanding.  
Language : Select a preferred language for the Web Viewer OSD.  
The default language is set to <English>.  
M
4. When done, click [Apply (  
)].  
116_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Date & Time  
1. From the Setup menu, select the  
<System (  
)> tab.  
2. Click <Date & Time>.  
3. Specify the time and date that will be  
applied to the camera.  
Current system time : Displays the  
current time settings of your system.  
Timezone : Specify the local time  
zone based on the GMT.  
Use daylight saving time :  
If checked, the time will be set one  
hour before the local time zone for  
the specified time period.  
This option will be displayed only in  
areas where DST is applied.  
System time setup : Specify the time and date that will be applied to your system.  
- Manual : Specify the time manually.  
- Synchronize with NTP server : Sync with the time of the specified server address.  
- Synchronize with PC viewer : Sets to the time of the computer connected.  
4. When done, click [Apply (  
)].  
If you select the <Synchronize with PC viewer>, the standard timezone should be set the same  
J
as the current timezone in PC.  
English _117  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
User  
1. From the Setup menu, select the  
<System (  
)> tab.  
2. Click <User>.  
3. Provide the necessary user information.  
Administrator password change :  
Change the password for the  
administrator.  
The default password can be exposed to  
a hacking thread so it is recommended to  
change the password after installing the  
product.  
Note that the security and other related  
issues caused by the unchanged password  
shall be responsible for the user.  
Guest setup : If you select <Enable guest access>, the guest account can access  
the Web viewer screen but can only view the live Viewer screen.  
The ID/password for the guest account is <guest/guest>, which cannot be changed.  
Authentication setup : If you select <Enable RTSP connection without  
authentication>, you can access RTSP without logging in and view the video.  
Current users : If you select <Use>, you can set or change the user permissions.  
The administrator can set the audio input, audio output and alarm output permissions.  
Profile : If you select <Default>, you can only see the default profile video; if selecting <All>, you  
can see the full profile videos.  
ONVIF functions available to a registered user allowed to use ONVIF functions are limited to those  
J
of granted with permission.  
Video Transfer and Changing Video Information: Set the profile to <All>, and set Audio Input and  
Audio Output.  
Video Transfer, Changing Video Information, Alarm Output : Set the profile to <All>, and select at  
your preference for the rest.  
4. When done, click [Apply (  
)].  
118_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Upgrade / Reboot  
1. From the Setup menu, select the  
<System (  
)> tab.  
2. Click <Upgrade / Reboot>.  
3. Select a desired item and set it  
appropriately.  
Upgrade : Performs upgrading the  
system.  
Factory default : Resets the system  
to the factory default.  
- Except network parameter : Reset the other settings except for Network settings.  
- All : Resets all settings including the camera settings. (however, the log  
information will not be reset)  
The IP addressing system will be defaulted to DHCP if you reset the camera. If no DHCP server is  
found, the previous settings will be restored automatically.  
Configuration backup & Restore : Backs up the current system settings before  
performing the restoration process. The system is automatically restarts after  
backup or restoration.  
Restart : Restarts the system.  
To perform the upgrade  
1. Click [Upgrade].  
2. Click [Browse] and specify a file to  
upgrade.  
3. Click [Send].  
4. The “Upgrade” dialog appears where  
the progression will be shown in the  
bottom.  
5. Once completed upgrading, the  
browser exits and the camera restarts.  
English _119  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
It may take a max of 20 minutes for the upgrade process.  
M
If you forcibly terminate the upgrade process, upgrade will not be completed properly.  
During restarting the system, accessing with web viewer will not be made.  
You can download the latest version from the Samsung web site (www.samsungcctv.com).  
To back up the current settings  
1. Click [Backup].  
The Save As dialog should appear.  
2. Specify the backup path with a proper  
file name, and click [Save].  
The backup file will be saved to the  
specified path in the format of “.bin”.  
To restore the backup settings  
1. To restore the backup settings, click  
[Restore].  
2. Select a backup file and click [Open].  
If you perform the backup or restoration,  
M
the web browser will be closed and the  
camera will reboots.  
120_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Log  
You can check the system log or event log.  
1. From the Setup menu, select the  
<System (  
)> tab.  
2. Click <Log>.  
3. Select a log type.  
System : You can check the system  
logs where any system changes  
are recorded including the time  
information.  
Event : You can check the event logs  
including the time information.  
4. From the right log list, select an item to  
search for.  
If you select <All> in the top left dropdown list, all logs for the applicable log type  
will be displayed.  
5. If one page can not display all the logs available, use the bottom buttons to move to  
the previous, next, or the last item.  
If you want to view the details of a log, click [Info  
(
)
] in the right column of the log; the log  
M
information will be shown in the bottom pane.  
Each page displays 15 logs with the latest one displayed at the top.  
The event/system log list can contain up to 1000 logs; after that, the existing logs will be deleted  
from the oldest one each time a new log is created.  
English _121  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup screen  
Profile access  
You can check the profile information.  
1. From the Setup menu, select the  
<System (  
)> tab.  
2. Click <Profile access>.  
Profile access : Show the information  
of the newly added profile.  
-
Profile : Show the information of the  
newly added codec.  
-
Bitrate(kbps) : Show both the actual  
bit rate and the set bit rate.  
-
-
-
Framerate(fps) : Show both the actual frame rate and the set frame rate.  
ATC(%) : Show the ATC status.  
Concurrent users count : Show the number of concurrent users who access the  
profile.  
Current users : Shows information on users accessing web viewer and displaying  
monitoring video.  
-
-
-
-
Profile : Show the name of the profile accessed by the user.  
IP address : Show the IP address of the current user.  
Bitrate(kbps) : Show the current bit rate.  
Network connection status : You can check the network connection status.  
To check information on the profile currently used, click <Profile access> again to refresh it.  
M
122_ setup screen  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
SPECIFICATION  
Description  
Items  
SNB-7002  
1/3” 3.1M PS CMOS  
2,064(H) X 1,578(V)  
2,052(H) X 1,536(V)  
Progressive  
SND-7082(F)  
SNV-7082  
Imaging Device  
Total Pixels  
Effective Pixels  
Scanning System  
Color : 0.7 Lux (F1.2, 50IRE), 0.011 Lux (Sens up 60X)  
Min. Illumination  
B/W : 0.07 Lux (F1.2, 50IRE), 0.001 Lux (Sens up 60X)  
Video  
S / N Ratio  
Video Out  
50dB  
CVBS : 1.0 Vp-p  
/ 75Ω composite  
(DIP Connector  
type), 704x480(N),  
704x576(P), for  
installation  
CVBS : 1.0 Vp-p / 75Ω composite,  
704x480(N), 704x576(P), for installation  
Focal Length (Zoom Ratio)  
-
-
3~8.5mm (2.8X) Motorized Vari-focal  
F1.2  
Max. Aperture Ratio  
Angular Field of View  
H : 87.3°(Wide)~ 31.2°(Tele),  
-
-
V : 64.5°(Wide)~ 23.4°(Tele)  
Min. Object Distance  
0.5 m  
Lens  
Focus Control  
Manual, Simple focus, Day&Night  
Zoom Movement Speed  
Lens Type  
-
Manual / DC Auto Iris DC Auto Iris  
Mount Type  
C/CS  
Board-in type  
English _123  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
Description  
Items  
SNB-7002  
SND-7082(F)  
SNV-7082  
Pan Range  
Pan Speed  
Tilt Range  
-
-
-
-
-
-
-
-
0°~355°  
0°~90°  
Tilt Speed  
Pan / Tilt /  
Rotate  
Rotate Range  
Preset  
0°~355°  
Preset Accuracy  
Auto Tracking  
Camera Title  
Off / On (Displayed up to 15 characters)  
Auto (ICR) / Color / B/W / External  
Day & Night  
Backlight Compensation Off / BLC / HLC  
Off / On (96dB)  
Wide Dynamic Range  
3M Mode : 20fps, 2M Mode : 30fps  
Operational  
Contrast Enhancement  
Digital Noise Reduction  
Digital Image Stabilization  
Motion Detection  
SSDR (Samsung Super Dynamic Range) (Off / On)  
SSNRIII (2D+3D Noise Filter) (Off / On)  
-
Off / On (4 Rectangular zones)  
Off / On (1ea 4 Point Polygonal + 16ea Rectangular zones)  
Privacy Masking  
124_ appendix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Description  
Items  
SNB-7002  
Off / Auto (2X ~ 60X)  
SND-7082(F)  
SNV-7082  
Sens-up  
(Frame Integration)  
AGC (Auto Gain Control) Off / Low / Middle / High  
White Balance  
ATW / AWC / Manual / Indoor / Outdoor  
Electronic Shutter Speed Auto / A.FLK / Manual (1/30 ~ 12,000sec)  
Digital Zoom  
Flip / Mirror  
-
Off / On  
Audio Detection, Face Detection, Tampering, Virtual Line,  
Operational  
Intelligent Video Analytics  
Alarm I/O  
Enter / Exit, Appear / Disappear  
Digital Input 1ea / Digital Output 1ea  
Remote Control Interface  
RS-485 Protocol  
-
-
Alarm Triggers  
Motion detection, Video Analytics, Sensor Input, Network Disconnect  
y File upload via FTP, E-Mail  
Alarm events  
Ethernet  
y Notification via E-Mail, TCP  
y local storage(SD/SDHC) recording at Network disconnected  
RJ-45 (10/100BASE-T)  
Video Compression  
H.264(MPEG-4 Part 10/AVC), Motion JPEG  
Format  
<3M Mode>  
2048x1536 / 1920x1080 /1600x1200/ 1280x1024 /1280x960 /  
1280x720 /1024x768/ 800x600 / 800x450 / 640x480 / 640x360  
/ 320x240 / 320x180  
Network  
Resolution  
<2M Mode>  
1920x1080 / 1280x1024 / 1280x960 / 1280x720 /1024x768/  
800x600 / 800x450 / 640x480 / 640x360 / 320x240 / 320x180  
English _125  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
Description  
Items  
SNB-7002  
SND-7082(F)  
SNV-7082  
<3M Mode>  
* H.264 : Max 20 fps at all resolutions  
* MJPEG : 800x600 ~ 320x180 - 20 fps,  
1024x768 ~ 1920x1080 - 15 fps,  
2048x1536 - 10 fps  
Max. Framerate  
Smart Codec  
<2M Mode>  
* H.264 : Max 30 fps at all resolutions  
* MJPEG : 800x600 ~ 320x180 - 30 fps,  
1024x768 ~ 1920x1080 : 15 fps  
Yes (Area Based Method)  
H.264 : Compression Level, Target Bitrate Level Control  
MJPEG : Quality Level Control  
Video Quality Adjustment  
H.264 : CBR or VBR  
MJPEG : VBR  
Bitrate Control Method  
Streaming Capability  
Audio I/O  
Multiple Streaming (Up to 6 Profiles)  
Network  
External Mic./Line in ,  
External Mic./Line in , Line out  
Line out, Built-in Mic.  
Audio Compression  
G.711 μ-law, G.726 (16Kbps, 24Kbps, 32Kbps, 40Kbps)  
Format  
Audio Communication  
IP  
Bi-directional  
IPv4, IPv6  
TCP/IP, UDP/IP, RTP(UDP), RTP(TCP), RTSP, NTP, HTTP, HTTPS,  
SSL, DHCP, PPPoE, FTP, SMTP, ICMP, IGMP, SNMPv1/v2c/  
v3(MIB-2), ARP, DNS, DDNS, QoS, UPnP, RTCP  
Protocol  
HTTPS(SSL) Login Authentication  
Digest Login Authentication  
IP Address Filtering  
Security  
User access Log  
802.1x Authentication  
126_ appendix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Description  
Items  
SNB-7002  
SND-7082(F)  
SNV-7082  
Streaming Method  
Max. User Access  
Memory Slot  
Unicast / Multicast  
10 users at Unicast Mode  
SD/SDHC Memory Slot  
ONVIF Conformance  
Yes  
English, French, German, Spanish, Italian, Chinese, Korean, Russian,  
Japanese, Swedish, Denish, Portuguese, Czech, Polish, Turkish,  
Rumanian, Serbian, Dutch, Croatian, Hungarian, Greek, Norway,  
Finland  
Webpage Language  
Network  
Supported OS : Windows XP / VISTA / 7, MAC OS X 10.7 or Higher  
Supported Browser : Internet Explorer 7.0 or Higher,  
Firefox 9.0 or higher, Chrome 15.0 or higher,  
Safari 5.1 or higher  
Web Viewer  
Central Management  
Software  
NET-i viewer  
PoE : -35°C ~  
+55°C (-40°F ~  
+131°F) / ~ 90%  
RH  
DC12V : -10°C ~  
+55°C (+14°F ~  
Operating Temperature / -10°C ~ +55°C (+14°F ~ +131°F) /  
+131°F) / 20% ~  
80% RH  
Humidity  
20% ~ 80% RH  
Environmental  
* Heater works at  
PoE power input.  
* After Start up,  
working at -40° by  
PoE  
Ingress Protection  
Vandal Resistance  
-
-
IP66 Grade  
IK10  
English _127  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
Description  
Items  
SNB-7002  
SND-7082(F)  
SNV-7082  
Input Voltage  
DC 12V, PoE(IEEE802.3af)  
Max. 9.0W (DC 12V,  
PoE(class3) - Heater  
Off)  
Electrical  
Power Consumption  
Max. 9.0W (DC 12V, PoE(class3))  
Body : Dark Gray /  
Max. 12.95W  
(PoE(class3) - Heater  
On)  
Body : Ivory /  
Color / Material  
Dimension  
Weight  
Body : Ivory / Plastic  
Aluminum  
Aluminum  
SND-7082 :  
Ø133.0 x  
W72.0 (2.83”) x  
H60.0(2.36”) x  
H129.4mm  
Ø160.0 x  
Mechanical  
SND-7082F :  
D150.5(5.93”)  
H134.5mm  
Ø159.9 x  
excluding projections  
H125.0mm (Flush  
Mounting Type)  
SND-7082 : 635g  
468g  
1,420g  
SND-7082F : 700g  
128_ appendix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PRODUCT OVERVIEW  
SNB-7002  
Unit : mm (inch)  
72.0 (2.83")  
150.5 (5.93")  
English _129  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
SND-7082  
Unit : mm (inch)  
125°  
110°  
Ø90  
Ø133 (5.24")  
Ø100 .4 (3.95")  
130_ appendix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SND-7082F  
30°  
Unit : mm (inch)  
30°  
Ø159.9 (6.3")  
Ø122.5 (4.82")  
Ø100 (3.94")  
English _131  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
SNV-7082  
Unit : mm (inch)  
83.5(3.29")  
85 (3.35")  
Ø160 (6.3")  
Ø100 (3.94")  
132_ appendix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
PROBLEM  
SOLUTION  
y Check to make sure that the camera’s Network settings are appropriate.  
y Check to make sure that all network cables have been connected  
properly.  
I can’t access the camera from a  
web browser.  
y If connected using DHCP, verify that the camera is able to acquire  
dynamic IP addresses without any problem.  
y If the camera is connected to a Broadband Router, verify that port  
forwarding is properly configured.  
y Connected Viewers become disconnected upon any change to camera  
or network configurations.  
Viewer got disconnected during  
monitoring.  
y Check all network connections.  
y If the camera is connected over an PPPoE network, it’ s possible for  
Viewer to disconnect under poor network conditions.  
y When you try to connect to the system using a tab browser, the same  
cookie information is shared, resulting in errors when connected.  
Therefore, instead of using a tab browser, open a new browser window  
to connect to the system.  
I cannot connect to the system  
using a tab browser of Internet  
Explorer 7.0.  
The camera connected to the  
network is not detected in the IP  
installer program.  
y Turn off the firewall settings on your PC and then search the camera  
again.  
y Check whether two or more cameras are set to a single multicast  
address instead of different addresses. If a single address is used for  
multiple cameras, the images may overlap.  
Images overlap.  
y If the transmission method is set to multicast, check whether there is a  
No image appears.  
router that supports multicast in the LAN the camera is connected to.  
English _133  
Download from Www.Somanuals.com. All Manuals Search And Download.  
appendix  
PROBLEM  
SOLUTION  
y Verify the settings in the following sequence:  
<Motion detection / Video  
analytics> of <Event setup> is set  
to <Enable>, but no notification  
e-mail reaches me even when an  
analysis event had occurred.  
A. Check <Data & Time> settings.  
B. The <Motion detection / Video analytics> should be set to <Enable>.  
C. Check if the <E-mail> option of <Event action setup> menu is  
checked to use.  
Can I define event rules even  
when I don’t use <Motion  
detection / Video analytics>?  
y Yes, it can be. You can set rules for events despite of the intelligent  
video analysis setting.  
No signal is found at the Alarm  
Output port even when an  
intelligent video analysis event is  
generated.  
y Check alarm output port settings.  
y Check if the memory card is defective.  
Cannot record into the SD memory  
card.  
y Check if the write protection tab of the memory card is set to  
LOCK  
.  
y Check if the memory card is inserted in the proper direction. Operation  
of memory card that is formatted by other devices is not guaranteed with  
this camera unit  
SD memory card is inserted but  
the camera does not operate  
properly.  
y Format the memory card again in <Setup> <Event> <Storage>  
menu.  
Cannot format the SD memory  
card.  
y Check if the write protection tab of the memory card is set to “LOCK”.  
134_ appendix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Open Source Announcement  
GPL/LGPL software license  
The software included in this product contains copyrighted software that is licensed under the GPL/LGPL. You may obtain  
the complete Corresponding Source code from us for a period of three years after our last shipment of this product by  
sending email to [email protected]  
If you want to obtain the complete Corresponding Source code in the physical medium such as CD-ROM, the cost of  
physically performing source distribution might be charged.  
GPL S/W  
-
Base Kernel, Busybox, Sysvinit, dosfstools, DSP-SW-package  
LGPL S/W  
gLibc, Inetutils  
-
GNU GENERAL PUBLIC LICENSE  
TERMS AND CONDITIONS FOR COPYING,  
DISTRIBUTION AND MODIFICATION  
Version 2, June 1991  
Version 2, June 1991 Copyright (C) 1989, 1991 Free  
Software Foundation, Inc. 51 Franklin S  
Copyright (C)1989, 1991 Free Software Foundation, Inc. 51  
Franklin Street,Fifth Floor, Boston, MA 02110-1301, USA  
Everyone is permitted to copy and distribute verbatim copies  
of this license document, but changing it is not allowed.  
0. This License applies to any program or other work which  
contains a notice placed by the copyright holder saying  
it may be distributed under the terms of this General  
Public License.  
Preamble  
The “Program”, below, refers to any such program or  
work, and a “work based on the Program” means either  
the Program or any derivative work under copyright law :  
that is to say, a work containing the Program or a portion  
of it, either verbatim or with modifications and/or translated  
into another language. (Hereinafter, translation is included  
without limitation in the term “modification”.) Each licensee is  
addressed as “you”.  
The licenses for most software are designed to take away  
your freedom to share and change it. By contrast, the  
GNU General Public License is intended to guarantee your  
freedom to share and change free software-- to make sure  
the software is free for all its users. This General Public  
License applies to most of the Free Software Foundations  
software and to any other program whose authors commit to  
using it. (Some other Free Software Foundation software is  
covered by the GNU Lesser General Public License instead.)  
You can apply it to your programs, too. When we speak of  
free software, we are referring to freedom, not price. Our  
General Public Licenses are designed to make sure that you  
have the freedom to distribute copies of free software (and  
charge for this service if you wish), that you receive source  
code or can get it if you want it, that you can change the  
software or use pieces of it in new free programs ; and that  
you know you can do these things.  
Activities other than copying, distribution and modification are  
not covered by this License ; they are outside its scope. The  
act of running the Program is not restricted, and the output  
from the Program is covered only if its contents constitute  
a work based on the Program (independent of having been  
made by running the Program). Whether that is true depends  
on what the Program does.  
1. You may copy and distribute verbatim copies of the  
Programs source code as you receive it, in any medium,  
provided that you conspicuously and appropriately  
publish on each copy an appropriate copyright notice and  
disclaimer of warranty; keep intact all the notices that refer  
to this License and to the absence of any warranty ; and  
give any other recipients of the Program a copy of this  
License along with the Program.  
To protect your rights, we need to make restrictions that  
forbid anyone to deny you these rights or to ask you to  
surrender the rights. These restrictions translate to certain  
responsibilities for you if you distribute copies of the software,  
or if you modify it.  
For example, if you distribute copies of such a program,  
whether gratis or for a fee, you must give the recipients all  
the rights that you have.  
You must make sure that they, too, receive or can get the  
source code. And you must show them these terms so they  
know their rights. We protect your rights with two steps :  
(1)copyright the software, and (2)offer you this license which  
gives you legal permission to copy, distribute and/or modify  
the software. Also, for each authors protection and ours, we  
want to make certain that everyone understands that there is  
no warranty for this free software. If the software is modified  
by someone else and passed on, we want its recipients to  
know that what they have is not the original, so that any  
problems introduced by others will not reflect on the original  
authors’ reputations.  
You may charge a fee for the physical act of transferring a  
copy, and you may at your option offer warranty protection  
in exchange for a fee.  
2. You may modify your copy or copies of the Program  
or any portion of it, thus forming a work based on the  
Program, and copy and distribute such modifications or  
work under the terms of Section 1 above, provided that  
you also meet all of these conditions :  
a) You must cause the modified files to carry prominent  
notices stating that you changed the files and the date  
of any change.  
b) You must cause any work that you distribute or publish,  
that in whole or in part contains or is derived from  
the Program or any part thereof, to be licensed as a  
whole at no charge to all third parties under the terms  
of this License.  
Finally, any free program is threatened constantly by software  
patents. We wish to avoid the danger that redistributors of a  
free program will individually obtain patent licenses, in effect  
making the program proprietary. To prevent this, we have  
made it clear that any patent must be licensed for everyones  
free use or not licensed at all. The precise terms and  
conditions for copying, distribution and modification follow.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
c) If the modified program normally reads commands  
interactively when run,you must cause it, when started  
running for such interactive use in the most ordinary  
way, to print or display an announcement including  
an appropriate copyright notice and a notice that  
there is no warranty (or else, saying that you provide a  
warranty) and that users may redistribute the program  
under these conditions, and telling the user how to  
view a copy of this License. (Exception:if the Program  
itself is interactive but does not normally print such an  
announcement, your work based on the Program is not  
required to print an announcement.)  
4. You may not copy, modify, sublicense, or distribute the  
Program except as expressly provided under this License.  
Any attempt otherwise to copy, modify, sublicense or  
distribute the Program is void, and will automatically  
terminate your rights under this License.  
However, parties who have received copies, or rights, from  
you under this License will not have their licenses terminated  
so long as such parties remain in full compliance.  
5. You are not required to accept this License, since you  
have not signed it. However, nothing else grants you  
permission to modify or distribute the Program or its  
derivative works.  
These requirements apply to the modified work as a whole.  
If identifiable sections of that work are not derived from the  
Program, and can be reasonably considered independent  
and separate works in themselves, then this License, and its  
terms, do not apply to those sections when you distribute  
them as separate works. But when you distribute the same  
sections as part of a whole which is a work based on the  
Program, the distribution of the whole must be on the terms  
of this License, whose permissions for other licensees  
extend to the entire whole, and thus to each and every part  
regardless of who wrote it.  
Thus, it is not the intent of this section to claim rights or  
contest your rights to work written entirely by you ; rather,  
the intent is to exercise the right to control the distribution  
of derivative or collective works based on the Program. In  
addition, mere aggregation of another work not based on  
the Program with the Program (or with a work based on the  
Program)on a volume of a storage or distribution medium  
does not bring the other work under the scope of this  
License.  
These actions are prohibited by law if you do not accept this  
License.Therefore, by modifying or distributing the Program  
(or any work based on the Program), you indicate your  
acceptance of this License to do so, and all its terms and  
conditions for copying, distributing or modifying the Program  
or works based on it.  
6. Each time you redistribute the Program (or any work  
based on the Program), the recipient automatically  
receives a license from the original licensor to copy,  
distribute or modify the Program subject to these  
terms and conditions. You may not impose any further  
restrictions on the recipients’ exercise of the rights granted  
herein. You are not responsible for enforcing compliance  
by third parties to this License.  
7. If, as a consequence of a court judgment or allegation of  
patent infringement or for any other reason (not limited to  
patent issues), conditions are imposed on you (whether  
by court order, agreement or otherwise)that contradict the  
conditions of this License, they do not excuse you from  
the conditions of this License. If you cannot distribute so  
as to satisfy simultaneously your obligations under this  
License and any other pertinent obligations, then as a  
consequence you may not distribute the Program at all.  
3. You may copy and distribute the Program (or a work  
based on it, under Section 2)in object code or executable  
form under the terms of Sections 1 and 2 above provided  
that you also do one of the following :  
a) Accompany it with the complete corresponding  
machine-readable source code, which must be distributed  
under the terms of Sections 1 and 2 above on a medium  
customarily used for software interchange ; or,  
For example, if a patent license would not permit royaltyfree  
redistribution of the Program by all those who receive copies  
directly or indirectly through you, then the only way you could  
satisfy both it and this License would be to refrain entirely  
from distribution of the Program.  
b) Accompany it with a written offer, valid for at least three  
years, to give any third party, for a charge no more than  
your cost of physically performing source distribution, a  
complete machinereadable copy of the corresponding  
source code, to be distributed under the terms of Sections  
1 and 2 above on a medium customarily used for software  
interchange ; or,  
If any portion of this section is held invalid or unenforceable  
under any particular circumstance, the balance of the section  
is intended to apply and the section as a whole is intended  
to apply in other circumstances. It is not the purpose of  
this section to induce you to infringe any patents or other  
property right claims or to contest validity of any such  
claims; this section has the sole purpose of protecting the  
integrity of the free software distribution system, which is  
implemented by public license practices. Many people have  
made generous contributions to the wide range of software  
distributed through that system in reliance on consistent  
application of that system ; it is up to the author/donor to  
decide if he or she is willing to distribute software through  
any other system and a licensee cannot impose that choice.  
This section is intended to make thoroughly clear what is  
believed to be a consequence of the rest of this License.  
8. If the distribution and/or use of the Program is restricted  
in certain countries either by patents or by copyrighted  
interfaces, the original copyright holder who places  
the Program under this License may add an explicit  
geographical distribution limitation excluding those  
countries,so that distribution is permitted only in or among  
countries not thus excluded. In such case, this License  
incorporates the limitation as if written in the body of  
this License.  
c) Accompany it with the information you received as to  
the offer to distribute corresponding source code. (This  
alternative is allowed only for noncommercial distribution  
and only if you received the program in object code  
or executable form with such an offer, in accord with  
Subsection b above.) The source code for a work means  
the preferred form of the work for making modifications  
to it. For an executable work, complete source code  
means all the source code for all modules it contains,  
plus any associated interface definition files, plus the  
scripts used to control compilation and installation of  
the executable. However, as a special exception, the  
source code distributed need not include anything that  
is normally distributed (in either source or binary form)  
with the major components (compiler, kernel, and so on)  
of the operating system on which the executable runs,  
unless that component itself accompanies the executable.  
If distribution of executable or object code is made by  
offering access to copy from a designated place, then  
offering equivalent access to copy the source code from  
the same place counts as distribution of the source code,  
even though third parties are not compelled to copy the  
source along with the object code.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9. The Free Software Foundation may publish revised and/  
or new versions of the General Public License from time  
to time. Such new versions will be similar in spirit to  
the present version, but may differ in detail to address  
new problems or concerns. Each version is given a  
distinguishing version number. If the Program specifies  
a version number of this License which applies to it and  
“any later version”, you have the option of following the  
terms and conditions either of that version or of any later  
version published by the Free Software Foundation. If  
the Program does not specify a version number of this  
License, you may choose any version ever published by  
the Free Software Foundation.  
10. If you wish to incorporate parts of the Program into  
other free programs whose distribution conditions are  
different, write to the author to ask for permission. For  
software which is copyrighted by the Free Software  
Foundation,write to the Free Software Foundation ; we  
sometimes make exceptions for this. Our decision will be  
guided by the two goals of preserving the free status of  
all derivatives of our free software and of promoting the  
sharing and reuse of software generally.  
This program is distributed in the hope that it will be  
useful, but WITHOUT ANY WARRANTY ; without even the  
implied warranty of MERCHANTABILITY or FITNESS FOR  
A PARTICULAR PURPOSE. See the GNU General Public  
License for more details.  
You should have received a copy of the GNU General Public  
License along with this program ; if not, write to the Free  
Software Foundation, Inc.,51 Franklin Street, Fifth Floor,  
Boston, MA 02110-1301, USA.  
Also add information on how to contact you by electronic  
and paper mail. If the program is interactive, make it output a  
short notice like this when it starts in an interactive mode :  
Gnomovision version 69, Copyright (C) year name of author  
Gnomovision comes with ABSOLUTELY NO WARRANTY ;  
for details type ‘show w’. This is free software, and you are  
welcome to redistribute it under certain conditions ; type ‘show  
c’ for details.  
The hypothetical commands ‘show w’ and ‘show c’ should  
show the appropriate parts of the General Public License.  
Of course, the commands you use may be called something  
other than ‘show w’ and ‘show c’ ; they could even be  
mouse-clicks or menu items-- whatever suits your program.  
You should also get your employer (if you work as a  
programmer)or your school, if any, to sign a “copyright  
disclaimer” for the program,if necessary. Here is a sample ;  
alter the names:  
NO WARRANTY  
11. BECAUSE THE PROGRAM IS LICENSED FREE OF  
CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM,  
TO THE EXTENT PERMITTED BY APPLICABLE LAW.  
EXCEPT WHEN OTHERWISE STATED IN WRITING THE  
COPYRIGHT HOLDERS AND/OR OTHER PARTIES  
PROVIDE THE PROGRAM “ASIS” WITHOUT WARRANTY  
OF ANY KIND, EITHER EXPRESSED OR IMPLIED,  
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED  
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR  
A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE  
QUALITY AND PERFORMANCE OF THE PROGRAM IS  
WITH YOU. SHOULD THE PROGRAMPROVE DEFECTIVE,  
YOU ASSUME THE COST OF ALL NECESSARY  
Yoyodyne, Inc.,hereby disclaims all copyright interest in the  
program ‘Gnomovision’ (which makes passes at compilers)  
written by James Hacker. signature of Ty Coon, 1 April 1989  
Ty Coon, President of Vice This General Public License does  
not permit incorporating  
your program into proprietary programs. If your program is a  
subroutine library, you may consider it more useful to permit  
linking proprietary applications with the library. If this is  
SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT  
UNLESS REQUIRED BY APPLICABLE LAW OR AGREED  
TO IN WRITING WILL ANY COPYRIGHT HOLDER,  
OR ANY OTHER PARTY WHO MAY MODIFY AND/OR  
REDISTRIBUTE DAMAGES, INCLUDING ANY GENERAL,  
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES  
ARISING OUT OF THE USE OR INABILITY TO USE THE  
PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS  
OF DATA OR DATA BEING RENDERED INACCURATE OR  
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR  
A FAILURE OF THE PROGRAM TO OPERATE WITH ANY  
OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER  
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF  
SUCH DAMAGES.  
Lwihcaetn ysoeu want to do, use the GNU Lesser General  
Public instead of this License.  
GNU GENERAL PUBLIC LICENSE  
Version 3, 29 June 2007  
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.  
org/>  
Everyone is permitted to copy and distribute verbatim copies  
of this license document, but changing it is not allowed.  
Preamble  
The GNU General Public License is a free, copyleft license  
for software and other kinds of works. The licenses for  
most software and other practical works are designed to  
take away your freedom to share and change the works.  
By contrast, the GNU General Public License is intended to  
guarantee your freedom to share and change all versions of  
a program--to make sure it remains free software for all its  
users.  
END OF TERMS AND CONDITIONS  
How to Apply These Terms to Your New Programs If you  
develop a new program, and you want it to be of the greatest  
possible use to the public, the best way to achieve this is to  
make it free software which everyone can redistribute and  
change under these terms.  
To do so, attach the following notices to the program. It is safest  
to attach them to the start of each source file to most effectively  
convey the exclusion of warranty ; and each file should have at  
least the “copyright” line and a pointer to where the full notice  
is found.one line to give the programs name and an idea of  
what it does.  
We, the Free Software Foundation, use the GNU General  
Public License for most of our software; it applies also to any  
other work released this way by its authors.  
You can apply it to your programs, too. When we speak of  
free software, we are referring to freedom, not price. Our  
General Public Licenses are designed to make sure that you  
have the freedom to distribute copies of free software (and  
charge for them if you wish), that you receive source code or  
can get it if you want it, that you can change the software or  
use pieces of it in new free programs, and that you know you  
can do these things.  
Copyright (C)yyyy name of author  
This program is free software ; you can redistribute it and/or  
modify it under the terms of the GNU General Public License  
as published by the Free Software Foundation ; either version  
2 of the License, or (at your option)any later version.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To protect your rights, we need to prevent others from  
denying you these rights or asking you to surrender  
the rights. Therefore, you have certain responsibilities if  
you distribute copies of the software, or if you modify it:  
responsibilities to respect the freedom of others.  
that (1) displays an appropriate copyright notice, and (2)  
tells the user that there is no warranty for the work (except  
to the extent that warranties are provided), that licensees  
may convey the work under this License, and how to view  
a copy of this License. If the interface presents a list of user  
commands or options, such as a menu, a prominent item in  
the list meets this criterion.  
For example, if you distribute copies of such a program,  
whether gratis or for a fee, you must pass on to the  
recipients the same freedoms that you received. You must  
make sure that they, too, receive or can get the source code.  
And you must show them these terms so they know their  
rights. Developers that use the GNU GPL protect your rights  
with two steps: (1) assert copyright on the software, and (2)  
offer you this License giving you legal permission to copy,  
distribute and/or modify it. For the developers’ and authors’  
protection, the GPL clearly explains that there is no warranty  
for this free software. For both users’ and authors’ sake, the  
GPL requires that modified versions be marked as changed,  
so that their problems will not be attributed erroneously to  
authors of previous versions. Some devices are designed to  
deny users access to install or run modified versions of the  
software inside them, although the manufacturer can do so.  
This is fundamentally incompatible with the aim of protecting  
users’ freedom to change the software. The systematic  
pattern of such abuse occurs in the area of products  
for individuals to use, which is precisely where it is most  
unacceptable. Therefore, we have designed this version of  
the GPL to prohibit the practice for those products. If such  
problems arise substantially in other domains, we stand  
ready to extend this provision to those domains in future  
versions of the GPL, as needed to protect the freedom of  
users.  
1. Source Code.  
The “source code” for a work means the preferred form of  
the work for making modifications to it. “Object code” means  
any non-source form of a work.  
A “Standard Interface” means an interface that either is  
an official standard defined by a recognized standards  
body, or, in the case of interfaces specified for a particular  
programming language, one that is widely used among  
developers working in that language.  
The “System Libraries” of an executable work include  
anything, other than the work as a whole, that (a) is included  
in the normal form of packaging a Major Component,  
but which is not part of that Major Component, and (b)  
serves only to enable use of the work with that Major  
Component, or to implement a Standard Interface for which  
an implementation is available to the public in source code  
form. A “Major Component”, in this context, means a major  
essential component (kernel, window system, and so on) of  
the specific operating system (if any) on which the executable  
work runs, or a compiler used to produce the work, or an  
object code interpreter used to run it.  
The “Corresponding Source” for a work in object code  
form means all the source code needed to generate, install,  
and (for an executable work) run the object code and to  
modify the work, including scripts to control those activities.  
However, it does not include the works System Libraries,  
or generalpurpose tools or generally available free programs  
which are used unmodified in performing those activities but  
which are not part of the work. For example, Corresponding  
Source includes interface definition files associated with  
source files for the work, and the source code for shared  
libraries and dynamically linked subprograms that the work  
is specifically designed to require, such as by intimate data  
communication or control flow between those subprograms  
and other parts of the work.  
Finally, every program is threatened constantly by software  
patents. States should not allow patents to restrict  
development and use of software on general-purpose  
omputers, but in those that do, we wish to avoid the special  
anger that patents applied to a free program could make it  
ffectively proprietary. To prevent this, the GPL assures that  
atents cannot be used to render the program non-free. he  
precise terms and conditions for copying, distribution and  
modification follow.  
TERMS AND CONDITIONS  
0. Definitions.  
The Corresponding Source need not include anything that  
users can regenerate automatically from other parts of the  
Corresponding Source. The Corresponding Source for a  
work in source code form is that same work.  
“This License” refers to version 3 of the GNU General Public  
License.  
“Copyright” also means copyright-like laws that apply to  
other kinds of works, such as semiconductor masks.  
“The Program” refers to any copyrightable work licensed  
under this License. Each licensee is addressed as “you”.  
“Licensees” and “recipients” may be individuals or  
organizations.  
2. Basic Permissions.  
All rights granted under this License are granted for the term  
of copyright on the Program, and are irrevocable provided  
the stated conditions are met. This License explicitly affirms  
your unlimited permission to run the unmodified Program.  
The output from running a covered work is covered by this  
License only if the output, given its content, constitutes a  
covered work. This License acknowledges your rights of fair  
use or other equivalent, as provided by copyright law.  
To modify” a work means to copy from or adapt all or part  
of the work in a fashion requiring copyright permission, other  
than the making of an exact copy. The resulting work is  
called a “modified version” of the earlier work or a work “based  
on” the earlier work.  
A “covered work” means either the unmodified Program or a  
work based on the Program.  
You may make, run and propagate covered works that you  
do not convey, without conditions so long as your license  
otherwise remains in force. You may convey covered works to  
others for the sole purpose of having them make modifications  
exclusively for you, or provide you with facilities for running  
those works, provided that you comply with the terms of this  
License in conveying all material for which you do not control  
copyright. Those thus making or running the covered works for  
you must do so exclusively on your behalf, under your direction  
and control, on terms that prohibit them from making any  
copies of your copyrighted material outside their relationship  
with you. Conveying under any other circumstances  
To propagate” a work means to do anything with it that,  
without permission, would make you directly or secondarily  
liable for infringement under applicable copyright law, except  
executing it on a computer or modifying a private copy.  
Propagation includes copying, distribution (with or without  
modification), making available to the public, and in some  
countries other activities as well.  
To convey” a work means any kind of propagation that  
enables other parties to make or receive copies. Mere  
interaction with a user through a computer network, with  
no transfer of a copy, is not conveying. An interactive user  
interface displays “Appropriate Legal Notices” to the extent  
that it includes a convenient and prominently visible feature  
is permitted solely under the conditions stated below.  
Sublicensing is not allowed; section 10 makes it unnecessary.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Protecting Users’ Legal Rights From anti-Circumvention  
Law.  
a) Convey the object code in, or embodied in, a physical  
product (including a physical distribution medium),  
accompanied by the Corresponding Source fixed on a  
durable physical medium customarily used for software  
interchange.  
b) Convey the object code in, or embodied in, a physical  
product (including a physical distribution medium),  
accompanied by a written offer, valid for at least three  
years and valid for as long as you offer spare parts or  
customer support for that product model, to give anyone  
who possesses the object code either (1) a copy of the  
Corresponding Source for all the software in the product  
that is covered by this License, on a durable physical  
medium customarily used for software interchange, for  
a price no more than your reasonable cost of physically  
performing this conveying of source, or (2) access to  
copy the Corresponding Source from a network server  
at no charge.  
No covered work shall be deemed part of an effective  
technological measure under any applicable law fulfilling  
obligations under article 11 of the WIPO copyright treaty  
adopted on 20 December 1996, or similar laws prohibiting or  
restricting circumvention of such measures.  
When you convey a covered work, you waive any legal  
power to forbid circumvention of technological measures to  
the extent such circumvention is effected by exercising rights  
under this License with respect to the covered work, and  
you disclaim any intention to limit operation or modification of  
the work as a means of enforcing, against the works users,  
your or third parties’ legal rights to forbid circumvention of  
technological measures.  
4. Conveying Verbatim Copies.  
You may convey verbatim copies of the Programs source  
code as you receive it, in any medium, provided that you  
conspicuously and appropriately publish on each copy an  
appropriate copyright notice; keep intact all notices stating  
that this License and any non-permissive terms added in  
accord with section 7 apply to the code; keep intact all  
notices of the absence of any warranty; and give all recipients  
a copy of this License along with the Program. You may  
charge any price or no price for each copy that you convey,  
and you may offer support or warranty protection for a fee.  
c) Convey individual copies of the object code with a  
copy of the written offer to provide the corresponding  
Source. This alternative is allowed only occasionally and  
noncommercially, and only if you received the object  
code with such an offer, in accord with subsection 6b.  
d) Convey the object code by offering access from a  
designated place (gratis or for a charge), and offer  
equivalent access to the Corresponding Source in  
the same way through the same place at no further  
charge. You need not require recipients to copy the  
Corresponding Source along with the object code. If  
the place to copy the object code is a network server,  
the Corresponding Source may be on a different  
server (operated by you or a third party) that supports  
equivalent copying facilities, provided you maintain clear  
directions next to the object code saying where to find  
the Corresponding Source. Regardless of what server  
hosts the Corresponding Source, you remain obligated  
to ensure that it is available for as long as needed to  
satisfy these requirements.  
5. Conveying Modified Source Versions.  
You may convey a work based on the Program, or the  
modifications to produce it from the Program, in the form of  
source code under the terms of section 4, provided that you  
also meet all of these conditions:  
a) The work must carry prominent notices stating that you  
modified it, and giving a relevant date.  
b) The work must carry prominent notices stating that  
it is released under this License and any conditions  
added under section 7. This requirement modifies the  
requirement in section 4 to “keep intact all notices”.  
e) Convey the object code using peer-to-peer  
transmission, provided you inform other peers where the  
object code and Corresponding Source of the work are  
being offered to the general public at no charge under  
subsection 6d. A separable portion of the object code,  
whose source code is excluded from the Corresponding  
Source as a System Library, need not be included in  
conveying the object code work. A “User Product”  
is either (1) a “consumer product”, which means any  
tangible personal property which is normally used for  
personal, family, or household purposes, or (2) anything  
designed or sold for incorporation into a dwelling. In  
determining whether a product is a consumer product,  
doubtful cases shall be resolved in favor of coverage.  
For a particular product received by a particular user,  
“normally used” refers to a typical or common use of that  
class of product, regardless of the status of the particular  
user or of the way in which the particular user actually  
uses, or expects or is expected to use, the product. A  
product is a consumer product regardless of whether  
the product has substantial commercial, industrial or  
non-consumer uses, unless such uses represent the  
only significant mode of use of the product.  
c) You must license the entire work, as a whole, under  
this License to anyone who comes into possession of  
a copy. This License will therefore apply, along with any  
applicable section 7 additional terms, to the whole of  
the work, and all its parts, regardless of how they are  
packaged. This License gives no permission to license  
the work in any other way, but it does not invalidate  
such permission if you have separately received it.  
d) If the work has interactive user interfaces, each must  
display Appropriate Legal Notices; however, if the  
Program has interactive interfaces that do not display  
Appropriate Legal Notices, your work need not make  
them do so. A compilation of a covered work with  
other separate and independent works, which are not  
by their nature extensions of the covered work, and  
which are not combined with it such as to form a larger  
program, in or on a volume of a storage or distribution  
medium, is called an “aggregate” if the compilation and  
its resulting copyright are not used to limit the access or  
legal rights of the compilations users beyond what the  
individual works permit. Inclusion of a covered work in  
an aggregate does not cause this License to apply to  
the other parts of the aggregate.  
“Installation Information” for a User Product means  
any methods, procedures, authorization keys, or other  
information required to install and execute modified versions  
of a covered work in that User Product from a modified  
version of its Corresponding Source. The information must  
suffice to ensure that the continued functioning of the  
modified object code is in no case prevented or interfered  
with solely because modification has been made. If you  
convey an object code work under this section in, or with,  
or specifically for use in, a User Product, and the conveying  
6. Conveying Non-Source Forms.  
You may convey a covered work in object code form under  
the terms of sections 4 and 5, provided that you also convey  
the machine-readable Corresponding Source under the  
terms of this License, in one of these ways:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
occurs as part of a transaction in which the right of  
possession and use of the User Product is transferred to the  
recipient in perpetuity or for a fixed term (regardless of how  
the transaction is characterized), the Corresponding Source  
conveyed under this section must be accompanied by the  
Installation Information. But this requirement does not apply  
if neither you nor any third party retains the ability to install  
modified object code on the User Product (for example, the  
work has been installed in ROM).  
permits relicensing or conveying under this License,  
you may add to a covered work material governed by  
the terms of that license document, provided that the  
further restriction does not survive such relicensing or  
conveying. If you add terms to a covered work in accord  
with this section, you must place, in the relevant source  
files, a statement of the additional terms that apply  
to those files, or a notice indicating where to find the  
applicable terms. Additional terms, permissive or non-  
permissive, may be stated in the form of a separately  
written license, or stated as exceptions; the above  
requirements apply either way.  
The requirement to provide Installation Information does not  
include a requirement to continue to provide support service,  
warranty, or updates for a work that has been modified or  
installed by the recipient, or for the User Product in which  
it has been modified or installed. Access to a network  
may be denied when the modification itself materially and  
adversely affects the operation of the network or violates the  
rules and protocols for communication across the network.  
Corresponding Source conveyed, and Installation Information  
provided, in accord with this section must be in a format that  
is publicly documented (and with an implementation available  
to the public in source code form), and must require no  
special password or key for unpacking, reading or copying.  
8. Termination.  
You may not propagate or modify a covered work except as  
expressly provided under this License. Any attempt otherwise  
to propagate or modify it is void, and will automatically  
terminate your rights under this License (including any patent  
licenses granted under the third paragraph of section 11).  
However, if you cease all violation of this License, then your  
license from a particular copyright holder is reinstated (a)  
provisionally, unless and until the copyright holder explicitly  
and finally terminates your license, and (b) permanently, if  
the copyright holder fails to notify you of the violation by  
some reasonable means prior to 60 days after the cessation.  
Moreover, your license from a particular copyright holder is  
reinstated permanently if the copyright holder notifies you  
ofthe violation by some reasonable means, this is the first time  
you have received notice of violation of this License (for any  
work) from that copyright holder, and you cure the violation  
prior to 30 days after your receipt of the notice. Termination of  
your rights under this section does not terminate the licenses  
of parties who have received copies or rights from you under  
this License. If your rights have been terminated and not  
permanently reinstated, you do not qualify to receive new  
licenses for the same material under section 10.  
7. Additional Terms.  
“Additional permissions” are terms that supplement the  
terms of this License by making exceptions from one or more  
of its conditions. Additional permissions that are applicable  
to the entire Program shall be treated as though they were  
included in this License, to the extent that they are valid  
under applicable law. If additional permissions apply only to  
part of the Program, that part may be used separately under  
those permissions, but the entire Program remains governed  
by this License without regard to the additional permissions.  
When you convey a copy of a covered work, you may at your  
option remove any additional permissions from that copy, or  
from any part of it. (Additional permissions may be written to  
require their own removal in certain cases when you modify  
the work.) You may place additional permissions on material,  
added by you to a covered work, for which you have or  
can give appropriate copyright permission. Notwithstanding  
any other provision of this License, for material you add to  
a covered work, you may (if authorized by the copyright  
holders of that material) supplement the terms of this License  
with terms:  
9. Acceptance Not Required for Having Copies.  
You are not required to accept this License in order to receive  
or run a copy of the Program. Ancillary propagation of a  
covered work occurring solely as a consequence of using  
peer-to-peer transmission to receive a copy likewise does  
not require acceptance. However, nothing other than this  
License grants you permission to propagate or modify any  
covered work. These actions infringe copyright if you do not  
accept this License. Therefore, by modifying or propagating  
a covered work, you indicate your acceptance of this License  
to do so.  
a) Disclaiming warranty or limiting liability differently from  
the terms of sections 15 and 16 of this License; or  
b) Requiring preservation of specified reasonable legal  
notices or author attributions in that material or in  
the Appropriate Legal Notices displayed by works  
containing it; or  
10. Automatic Licensing of Downstream Recipients.  
Each time you convey a covered work, the recipient  
automatically receives a license from the original licensors,  
to run, modify and propagate that work, subject to this  
License. You are not responsible for enforcing compliance  
by third parties with this License. An “entity transaction”  
is a transaction transferring control of an organization, or  
substantially all assets of one, or subdividing an organization,  
or merging organizations. If propagation of a covered  
work results from an entity transaction, each party to that  
transaction who receives a copy of the work also receives  
whatever licenses to the work the partys predecessor in  
interest had or could give under the previous paragraph, plus  
a right to possession of the Corresponding Source of the  
work from the predecessor in interest, if the predecessor has  
it or can get it with reasonable efforts. You may not impose  
any further restrictions on the exercise of the rights granted  
or affirmed under this License. For example, you may not  
impose a license fee, royalty, or other charge for exercise of  
rights granted under this License, and you may not initiate  
litigation (including a cross-claim or counterclaim in a lawsuit)  
alleging that any patent claim is infringed by making, using,  
selling, offering for sale, or importing the Program or any  
portion of it.  
c) Prohibiting misrepresentation of the origin of that  
material, or requiring that modified versions of such  
material be marked in reasonable ways as different from  
the original version; or  
d) Limiting the use for publicity purposes of names of  
licensors or authors of the material; or  
e) Declining to grant rights under trademark law for use of  
some trade names, trademarks, or service marks; or  
f) Requiring indemnification of licensors and authors of  
that material by anyone who conveys the material (or  
modified versions of it) with contractual assumptions  
of liability to the recipient, for any liability that these  
contractual assumptions directly impose on those  
licensors and authors. All other non-permissive  
additional terms are considered “further restrictions”  
within the meaning of section 10. If the Program as you  
received it, or any part of it, contains a notice stating  
that it is governed by this License along with a term  
that is a further restriction, you may remove that term.  
If a license document contains a further restriction but  
Download from Www.Somanuals.com. All Manuals Search And Download.  
11. Patents.  
12. No Surrender of Others’ Freedom.  
A “contributor” is a copyright holder who authorizes use  
under this License of the Program or a work on which the  
Program is based. The work thus licensed is called the  
contributors contributor version”. A contributors essential  
patent claims” are all patent claims owned or controlled  
by the contributor, whether already acquired or hereafter  
acquired, that would be infringed by some manner, permitted  
by this License, of making, using, or selling its contributor  
version, but do not include claims that would be infringed  
only as a consequence of further modification of the  
contributor version. For purposes of this definition, “control”  
includes the right to grant patent sublicenses in a manner  
consistent with the requirements of this License. Each  
contributor grants you a non-exclusive, worldwide, royalty-  
free patent license under the contributors essential patent  
claims, to make, use, sell, offer for sale, import and otherwise  
run, modify and propagate the contents of its contributor  
version.  
If conditions are imposed on you (whether by court order,  
agreement or otherwise) that contradict the conditions of  
this License, they do not excuse you from the conditions of  
thisLicense. If you cannot convey a covered work so as to  
satisfy simultaneously your obligations under this License and  
any other pertinent obligations, then as a consequence you  
may not convey it at all. For example, if you agree to terms  
that obligate you to collect a royalty for further conveying  
from those to whom you convey the Program, the only way  
you could satisfy both those terms and this License would be  
to refrain entirely from conveying the Program.  
13. Use with the GNU Affero General Public License.  
Notwithstanding any other provision of this License, you  
have permission to link or combine any covered work with  
a work licensed under version 3 of the GNU Affero General  
Public License into a single combined work, and to convey  
the resulting work. The terms of this License will continue to  
apply to the part which is the covered work, but the special  
requirements of the GNU Affero General Public License,  
section 13, concerning interaction through a network will  
apply to the combination as such.  
In the following three paragraphs, a “patent license” is any  
express agreement or commitment, however denominated,  
not to enforce a patent (such as an express permission  
to practice a patent or covenant not to sue for patent  
infringement). To grant” such a patent license to a party  
means to make such an agreement or commitment not  
to enforce a patent against the party. If you convey a  
14. Revised Versions of this License.  
The Free Software Foundation may publish revised and/ or  
new versions of the GNU General Public License from time to  
time. Such new versions will be similar in spirit to the present  
version, but may differ in detail to address new problems or  
concerns.  
covered work, knowingly relying on a patent license, and  
the Corresponding Source of the work is not available for  
anyone to copy, free of charge and under the terms of this  
License, through a publicly available network server or other  
readily accessible means, then you must either (1) cause the  
Corresponding Source to be so available, or (2) arrange to  
deprive yourself of the benefit of the patent license for this  
particular work, or (3) arrange, in a manner consistent with  
the requirements of this License, to extend the patent license  
to downstream recipients. “Knowingly relying” means you  
have actual knowledge that, but for the patent license, your  
conveying the covered work in a country, or your recipients  
use of the covered work in a country, would infringe one or  
more identifiable patents in that country that you have reason  
to believe are valid. If, pursuant to or in connection with a  
single transaction or arrangement, you convey, or propagate  
by procuring conveyance of, a covered work, and grant a  
patent license to some of the parties receiving the covered  
work authorizing them to use, propagate, modify or convey  
a specific copy of the covered work, then the patent license  
you grant is automatically extended to all recipients of the  
covered work and works based on it. A patent license is  
“discriminatory” if it does not include within the scope of its  
coverage, prohibits the exercise of, or is conditioned on the  
non-exercise of one or more of the rights that are specifically  
granted under this License. You may not convey a covered  
work if you are a party to an arrangement with a third party  
that is in the business of distributing software, under which  
you make payment to the third party based on the extent  
of your activity of conveying the work, and under which the  
third party grants, to any of the parties who would receive the  
covered work from you, a discriminatory patent license  
Each version is given a distinguishing version number. If the  
Program specifies that a certain numbered version of the  
GNU General Public License “or any later version” applies to  
it, you have the option of following the terms and conditions  
either of that numbered version or of any later version  
published by the Free Software Foundation. If the Program  
does not specify a version number of the GNU General Public  
License, you may choose any version ever published by the  
Free Software Foundation. If the Program specifies that a  
proxy can decide which future versions of the GNU General  
Public License can be used, that proxys public statement  
of acceptance of a version permanently authorizes you to  
choose that version for the Program. Later license versions  
may give you additional or different permissions. However, no  
additional obligations are imposed on any author or copyright  
holder as a result of your choosing to follow a later version.  
15. Disclaimer of Warranty.  
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE  
EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT  
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT  
HOLDERS AND/OR OTHER PARTIES PROVIDE THE  
PROGRAM “AS IS” WITHOUT WARRANTY OF ANY  
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND  
PERFORMANCE OF THE PROGRAM IS WITH YOU.  
SHOULD THE PROGRAM PROVE DEFECTIVE, YOU  
ASSUME THE COST OF ALL NECESSARY SERVICING,  
REPAIR OR CORRECTION.  
(a) in connection with copies of the covered work conveyedby  
you (or copies made from those copies), or  
(b) primarily for and in connection with specific products or  
compilations that contain the covered work, unless you  
entered into that arrangement, or that patent license  
was granted, prior to 28 March 2007. Nothing in this  
License shall be construed as excluding or limiting any  
implied license or other defenses to infringement that may  
otherwise be available to you under applicable patent law.  
16. Limitation of Liability.  
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW  
OR AGREED TO IN WRITING WILL ANY COPYRIGHT  
HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/  
OR CONVEYS THE PROGRAM AS PERMITTED ABOVE,  
BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY  
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL  
DAMAGES ARISING OUT OF THE USE OR INABILITY TO  
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO  
LOSS OF DATA OR DATA BEING RENDERED INACCURATE  
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A FAILURE OF THE PROGRAM TO OPERATE WITH ANY  
OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER  
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF  
SUCH DAMAGES.  
Finally, software patents pose a constant threat to the  
existence of any free program. We wish to make sure that  
a company cannot effectively restrict the users of a free  
program by obtaining a restrictive license from a patent  
holder. Therefore, we insist that any patent license obtained  
for a version of the library must be consistent with the full  
freedom of use specified in this license. Most GNU software,  
including some libraries, is covered by the ordinary GNU  
General Public License. This license, the GNU Lesser General  
Public License, applies to certain designated libraries, and is  
quite different from the ordinary General Public License. We  
use this license for certain libraries in order to permit linking  
those libraries into non-free programs.  
17. Interpretation of Sections 15 and 16.  
If the disclaimer of warranty and limitation of liability provided  
above cannot be given local legal effect according to their  
terms, reviewing courts shall apply local law that most  
closely approximates an absolute waiver of all civil liability  
in connection with the Program, unless a warranty or  
assumption of liability accompanies a copy of the Program in  
return for a fee.  
When a program is linked with a library, whether statically or  
using a shared library, the combination of the two is legally  
speaking a combined work, a derivative of the original library.  
END OF TERMS AND CONDITIONS GNU  
LESSER GENERAL PUBLIC LICENSE  
The ordinary General Public License therefore permits such  
Version 2.1, February 1999  
linking only if the entire combination fits its criteria of freedom.  
Copyright (C) 1991, 1999 Free Software Foundation, Inc.  
The Lesser General Public License permits more lax criteria  
for linking other code with the library. We call this license the  
“Lesser” General Public License because it does Less to  
protect the users freedom than the ordinary General Public  
License. It also provides other free software developers Less  
of an advantage over competing non-free programs. These  
disadvantages are the reason we use the ordinary General  
Public License for many libraries.  
51Franklin Street, Fifth Floor, Boston, MA 02110-1301  
USA Everyone is permitted to copy and distribute verbatim  
copies of this license document, but changing it is not  
allowed. [This is the first released version of the Lesser GPL.  
It also counts as the successor of the GNU Library Public  
License, version 2, hence the version number 2.1.]  
Preamble  
However, the Lesser license provides advantages in certain  
The licenses for most software are designed to take away  
your freedom to share and change it. By contrast, the GNU  
General Public Licenses are intended to guarantee your  
freedom to share and change free software to make sure the  
software is free for all its users.  
special circumstances.  
For example, on rare occasions, there may be a special need  
to encourage the widest possible use of a certain library, so  
that it becomes a de-facto standard. To achieve this, nonfree  
programs must be allowed to use the library. A more frequent  
case is that a free library does the same job as widely used  
non-free libraries. In this case, there is little to  
This license, the Lesser General Public License, applies  
to some specially designated software packages-typically  
libraries-of the Free Software Foundation and other authors  
who decide to use it. You can use it too, but we suggest you  
first think carefully about whether this license or the ordinary  
General Public License is the better strategy to use in any  
particular case, based on the explanations below. When we  
speak of free software, we are referring to freedom of use, not  
price. Our General Public Licenses are designed to make sure  
that you have the freedom to distribute copies of free software  
(and charge for this service if you wish); that you receive  
source code or can get it if you want it; that you can change  
the software and use pieces of it in new free programs; and  
that you are informed that you can do these things.  
gain by limiting the free library to free software only, so we  
use the Lesser General Public License.  
In other cases, permission to use a particular library in  
nonfree programs enables a greater number of people to use  
a large body of free software. For example, permission to use  
the GNU C Library in non-free programs enables many more  
people to use the whole GNU operating system, as well as  
its variant, the GNU/ Linux operating system.  
Although the Lesser General Public License is Less  
protective of the users’ freedom, it does ensure that the user  
of a program that is linked with the Library has the freedom  
and  
the wherewithal to run that program using a modified version  
of the Library. The precise terms and conditions for copying,  
distribution and modification follow. Pay close attention to the  
difference between a “work based on the library” and a “work  
that uses the library”. The former contains code derived from  
the library, whereas the latter must be combined with the  
library in order to run.  
To protect your rights, we need to make restrictions that  
forbid distributors to deny you these rights or to ask you to  
surrender these rights. These restrictions translate to certain  
responsibilities for you if you distribute copies of the library or  
if you modify it.  
For example, if you distribute copies of the library, whether  
gratis or for a fee, you must give the recipients all the rights  
that we gave you. You must make sure that they, too,  
receive or can get the source code. If you link other code  
with the library, you must provide complete object files to the  
recipients, so that they can relink them with the library after  
making changes to the library and recompiling it. And you  
must show them these terms so they know their rights. We  
protect your rights with a two-step method: (1) we copyright  
the library, and (2) we offer you this license, which gives you  
legal permission to copy, distribute and/or modify the library.  
To protect each distributor, we want to make it very clear  
that there is no warranty for the free library. Also, if the library  
is modified by someone else and passed on, the recipients  
should know that what they have is not the original version,  
so that the original authors reputation will not be affected by  
problems that might be introduced by others.  
TERMS AND CONDITIONS FOR COPYING,  
DISTRIBUTION AND MODIFICATION  
0. This License Agreement applies to any software library  
or other program which contains a notice placed by the  
copyright holder or other authorized party saying it may  
be distributed under the terms of this Lesser General  
Public License (also called “this License”). Each licensee is  
addressed as “you”.  
A “library” means a collection of software functions and/  
or data prepared so as to be conveniently linked with  
application programs (which use some of those functions  
and data) to form executables.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The “Library”, below, refers to any such software library  
or work which has been distributed under these terms. A  
“work based on the Library” means either the Library or  
any derivative work under copyright law: that is to say, a  
work containing the Library or a portion of it, either verbatim  
or with modifications and/or translated straightforwardly  
into another language. (Hereinafter, translation is included  
without limitation in the term “modification”.) “Source code”  
for a work means the preferred form of the work for making  
modifications to it. For a library, complete source code  
means all the source code for all modules it contains, plus  
any associated interface definition files, plus the scripts used  
to control compilation and installation of the library.  
Activities other than copying, distribution and modification are  
not covered by this License; they are outside its scope. The  
act of running a program using the Library is not restricted,  
and output from such a program is covered only if its  
contents constitute a work based on the Library (independent  
of the use of the Library in a tool for writing it). Whether that  
is true depends on what the Library does and what the  
program that uses the Library does.  
1. You may copy and distribute verbatim copies of the  
Librarys complete source code as you receive it, in  
any medium, provided that you conspicuously and  
appropriately publish on each copy an appropriate  
copyright notice and disclaimer of warranty; keep intact all  
the notices that refer to this License and to the absence of  
any warranty; and distribute a copy of this License along  
with the Library. You may charge a fee for the physical act  
of transferring a copy, and you may at your option offer  
warranty protection in exchange for a fee.  
Thus, it is not the intent of this section to claim rights or  
contest your rights to work written entirely by you; rather,  
the intent is to exercise the right to control the distribution of  
derivative or collective works based on the Library.  
In addition, mere aggregation of another work not based  
on the Library with the Library (or with a work based on the  
Library) on a volume of a storage or distribution medium does  
not bring the other work under the scope of this License.  
3. You may opt to apply the terms of the ordinary GNU  
General Public License instead of this License to a given  
copy of the Library. To do this, you must alter all the notices  
that refer to this License, so that they refer to the ordinary  
GNU General Public License, version 2, instead of to this  
License. (If a newer version than version 2 of the ordinary  
GNU General Public License has appeared, then you can  
specify that version instead if you wish.) Do not make any  
other change in these notices. Once this change is made in a  
given copy, it is irreversible for that copy, so the ordinary GNU  
General Public License applies to all subsequent copies and  
derivative works made from that copy. This option is useful  
when you wish to copy part of the code of the Library into a  
program that is not a library.  
4. You may copy and distribute the Library (or a portion  
or derivative of it, under Section 2) in object code or  
executable form under the terms of Sections 1 and 2  
above provided t hat you accompany it with the complete  
corresponding machine-readable source code, which  
must be distributed under the terms of Sections 1 and  
2 above on a medium customarily used for software  
interchange.  
If distribution of object code is made by offering access  
to copy from a designated place, then offering equivalent  
access to copy the source code from the same place  
satisfies the requirement to distribute the source code, even  
though third parties are not compelled to copy the source  
along with the object code.  
2. You may modify your copy or copies of the Library or any  
portion of it, thus forming a work based on the Library,  
and copy and distribute such modifications or work under  
the terms of Section 1 above, provided that you also meet  
all of these conditions:  
a) The modified work must itself be a software library.  
5. A program that contains no derivative of any portion of  
the Library, but is designed to work with the Library by  
being compiled or linked with it, is called a “work that uses  
the Library”. Such a work, in isolation, is not a derivative  
work of the Library, and therefore falls outside the scope  
of this License.  
b) You must cause the files modified to carry prominent  
notices stating that you changed the files and the date  
of any change. c) You must cause the whole of the work  
to be licensed at no charge to all third parties under the  
terms of this License. d) If a facility in the modified Library  
refers to a function or a table of data to be supplied by  
an application program that uses the facility, other than  
as an argument passed when the facility is invoked, then  
you must make a good faith effort to ensure that, in the  
event an application does not supply such function or  
table, the facility still operates, and performs whatever  
part of its purpose remains meaningful. (For example,  
a function in a library to compute square roots has a  
purpose that is entirely well-defined independent of  
the application. Therefore, Subsection 2d requires  
that any application-supplied function or table used  
by this function must be optional: if the application  
does not supply it, the square root function must still  
compute square roots.) These requirements apply to  
the modified work as a whole. If identifiable sections  
of that work are not derived from the Library, and can  
be reasonably considered independent and separate  
works in themselves, then this License, and its terms,  
do not apply to those sections when you distribute them  
as separate works. But when you distribute the same  
sections as part of a whole which is a work based on  
the Library, the distribution of the whole must be on  
the terms of this License, whose permissions for other  
licensees extend to the entire whole, and thus to each  
and every part regardless of who wrote it.  
However, linking a “work that uses the Library” with the  
Library creates an executable that is a derivative of the  
Library (because it contains portions of the Library), rather  
than a “work that uses the library”. The executable is  
therefore covered by this License. Section 6 states terms for  
distribution of such executables.  
When a “work that uses the Library” uses material from a  
header file that is part of the Library, the object code for the  
work may be a derivative work of the Library even though  
the source code is not. Whether this is true is especially  
significant if the work can be linked without the Library, or if  
the work is itself a library. The threshold for this to be true is  
not precisely defined by law.  
If such an object file uses only numerical parameters, data  
structure layouts and accessors, and small macros and  
small inline functions (ten lines or less in length), then the use  
of the object file is unrestricted, regardless of whether it is  
legally a derivative work. (Executables containing this object  
code plus portions of the Library will still fall under Section  
6.) Otherwise, if the work is a derivative of the Library, you  
may distribute the object code for the work under the terms  
of Section 6. Any executables containing that work also fall  
under Section 6, whether or not they are linked directly with  
the Library itself.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. As an exception to the Sections above, you may also  
combine or link a “work that uses the Library” with the  
Library to produce a work containing portions of the  
Library, and distribute that work under terms of your  
choice, provided that the terms permit modification  
of the work for the customers own use and reverse  
engineering for debugging such modifications. You must  
give prominent notice with each copy of the work that the  
Library is used in it and that the Library and its use are  
covered by this License. You must supply a copy of this  
License. If the work during execution displays copyright  
notices, you must include the copyright notice for the  
Library among them, as well as a reference directing the  
user to the copy of this License. Also, you must do one  
of these things:  
a) Accompany the work with the complete corresponding  
machine-readable source code for the Library including  
whatever changes were used in the work (which must  
be distributed under Sections 1 and 2 above); and,  
if the work is an executable linked with the Library,  
with the complete machine readable “work that uses  
the Library”, as object code and/or source code, so  
that the user can modify the Library and then relink to  
produce a modified executable containing the modified  
Library. (It is understood that the user who changes  
the contents of definitions files in the Library will not  
necessarily be able to recompile the application to use  
the modified definitions.)  
b) Use a suitable shared library mechanism for linking  
withthe Library. A suitable mechanism is one that (1)  
uses at run time a copy of the library already present  
on the users computer system, rather than copying  
library functions into the executable, and (2) will operate  
properly with a modified version of the library, if the  
user installs one, as long as the modified version is  
interface-compatible with the version that the work  
was made with.  
c) Accompany the work with a written offer, valid for at  
least three years, to give the same user the materials  
specified in Subsection 6a, above, for a charge no  
more than the cost of performing this distribution.  
a) Accompany the combined library with a copy of the same  
work based on the Library, uncombined with any other  
library facilities. This must be distributed under the terms  
of the Sections above.  
b) Give prominent notice with the combined library of the  
fact that part of it is a work based on the Library, and  
explaining where to find the accompanying uncombined  
form of the same work.  
8. You may not copy, modify, sublicense, link with, or  
distribute the Library except as expressly provided under  
this License. Any attempt otherwise to copy, modify,  
sublicense, link with, or distribute the Library is void,  
and will automatically terminate your rights under this  
License. However, parties who have received copies,  
or rights, from you under this License will not have their  
licenses terminated so long as such parties remain in full  
compliance.  
9. You are not required to accept this License, since you  
have not signed it. However, nothing else grants you  
permission to modify or distribute the Library or its  
derivative works. These actions are prohibited by law if  
you do not accept this License. Therefore, by modifying or  
distributing the Library (or any work based on the Library),  
you indicate your acceptance of this License to do so,  
and all its terms and conditions for copying, distributing or  
modifying the Library or works based on it.  
10. Each time you redistribute the Library (or any work based  
on the Library), the recipient automatically receives a  
license from the original licensor to copy, distribute, link  
with or modify the Library subject to these terms and  
conditions. You may not impose any further restrictions  
on the recipients’ exercise of the rights granted herein.  
You are not responsible for enforcing compliance by third  
parties with this License.  
11. If, as a consequence of a court judgment or allegation of  
patent infringement or for any other reason (not limited to  
patent issues), conditions are imposed on you (whether by  
court order, agreement or otherwise) that contradict the  
conditions of this License, they do not excuse you from  
the conditions of this License. If you cannot istribute so as  
to satisfy simultaneously your obligations nder this License  
and any other pertinent obligations, then as a consequence  
you may not distribute the Library at all. For example, if a  
patent license would not permit royalty free redistribution  
of the Library by all those who receive copies directly or  
indirectly through you, then the only way you could satisfy  
both it and this License would be to refrain entirely from  
distribution of the Library.  
d) If distribution of the work is made by offering access  
to copy from a designated place, offer equivalent  
access to copy the above specified materials from the  
same place.  
e) Verify that the user has already received a copy of  
these materials or that you have already sent this user a  
copy. For an executable, the required form of the “work  
that uses the Library” must include any data and utility  
programs needed for reproducing the executable from  
it. However, as a special exception, the materials to be  
distributed need not include anything that is normally  
distributed (in either source or binary form) with the  
major components (compiler, kernel, and so on) of the  
operating system on which the executable runs, unless  
that component itself accompanies the executable.  
It may happen that this requirement contradicts the  
license restrictions of other proprietary libraries that do  
not normally accompany the operating system. Such a  
contradiction means you cannot use both them and the  
Library together in an executable that you distribute.  
7. You may place library facilities that are a work based on  
the Library side-by-side in a single library together with  
other library facilities not covered by this License, and  
distribute such a combined library, provided that the  
separate distribution of the work based on the Library and  
of the other library facilities is otherwise permitted, and  
provided that you do these two things:  
If any portion of this section is held invalid or unenforceable  
under any particular circumstance, the balance of the section  
is intended to apply, and the section as a whole is intended  
to apply in other circumstances.  
It is not the purpose of this section to induce you to infringe  
any patents or other property right claims or to contest  
validity of any such claims; this section has the sole purpose  
of protecting the integrity of the free software distribution  
system which is implemented by public license practices.  
Many people have made generous contributions to the  
wide range of software distributed through that system  
in reliance on consistent application of that system; it is  
up to the author/donor to decide if he or she is willing to  
distribute software through any other system and a licensee  
cannot impose that choice. This section is intended to make  
thoroughly clear what is believed to be a consequence of the  
rest of this License.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
12. If the distribution and/or use of the Library is restricted  
in certain countries either by patents or by copyrighted  
interfaces, the original copyright holder who places  
the Library under this License may add an explicit  
geographical distribution limitation excluding those  
countries, so that distribution is permitted only in or  
among countries not thus excluded. In such case, this  
License incorporates the limitation as if written in the  
body of this License.  
13. The Free Software Foundation may publish revised and/  
or new versions of the Lesser General Public License  
from time to time. Such new versions will be similar  
in spirit to the present version, but may differ in detail  
to address new problems or concerns. Each version  
is given a distinguishing version number. If the Library  
specifies a version number of this License which applies  
to it and “any later version”, you have the option of  
following the terms and conditions either of that version  
or of any later version published by the Free Software  
Foundation. If the Library does not specify a license  
version number, you may choose any version ever  
published by the Free Software Foundation.  
14. If you wish to incorporate parts of the Library into  
other free programs whose distribution conditions are  
incompatible with these, write to the author to ask for  
permission. For software which is copyrighted by the  
Free Software Foundation, write to the Free Software  
Foundation; we sometimes make exceptions for this. Our  
decision will be guided by the two goals of preserving the  
free status of all derivatives of our free software and of  
promoting the sharing and reuse of software generally.  
END OF TERMS AND CONDITIONS  
How to Apply These Terms to Your New Libraries If you  
develop a new library, and you want it to be of the greatest  
possible use to the public, we recommend making it free  
software that everyone can redistribute and change. You  
can do so by permitting redistribution under these terms (or,  
alternatively, under the terms of the ordinary General Public  
License).  
To apply these terms, attach the following notices to the  
library. It is safest to attach them to the start of each source  
file to most effectively convey the exclusion of warranty;  
and each file should have at least the “copyright” line and a  
pointer to where the full notice is found. one line to give the  
librarys name and an idea of what it does.  
Copyright (C) year name of author  
This library is free software; you can redistribute it and/ or  
modify it under the terms of the GNU Lesser General Public  
License as published by the Free Software Foundation;  
either version 2.1 of the License, or (at your option) any later  
version.  
This library is distributed in the hope that it will be useful,  
but WITHOUT ANY WARRANTY; without even the implied  
warranty of MERCHANTABILITY or FITNESS FOR A  
PARTICULAR PURPOSE. See the GNU Lesser General  
Public License for more details.  
You should have received a copy of the GNU Lesser General  
Public License along with this library; if not, write to the Free  
Software Foundation, Inc., 51 Franklin Street, Fifth Floor,  
Boston, MA 02110-1301 USA Also add information on how  
to contact you by electronic and paper mail. You should also  
get your employer (if you work as a programmer) or your  
school, if any, to sign a “copyright disclaimer” for the library, if  
necessary. Here is a sample; alter the names: Yoyodyne, Inc.,  
hereby disclaims all copyright interest in the library ‘Frob’ (a  
library for tweaking knobs) written by James Random Hacker.  
signature of Ty Coon, 1 April 1990 Ty Coon, President of Vice.  
NO WARRANTY  
15. BECAUSE THE LIBRARY IS LICENSED FREE  
OF CHARGE, THERE IS NO WARRANTY FOR  
THE LIBRARY, TO THE EXTENT PERMITTED BY  
APPLICABLE LAW. EXCEPT WHEN OTHERWISE  
STATED IN WRITING THE COPYRIGHT HOLDERS  
AND/OR OTHER PARTIES PROVIDE THE LIBRARY  
“AS IS” WITHOUT WARRANTY OF ANY KIND,  
EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT  
NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY  
AND PERFORMANCE OF THE LIBRARY IS WITH YOU.  
SHOULD THE LIBRARY PROVE DEFECTIVE, YOU  
ASSUME THE COST OF ALL NECESSARY SERVICING,  
REPAIR OR CORRECTION.  
Open SSL LICENSE  
Copyright (c) 1998-2006 The OpenSSL Project. All rights  
reserved. Redistribution and use in source and binary forms,  
with or without modification, are permitted provided that the  
following conditions are met:  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
3. All advertising materials mentioning features or use of this  
software must display the following acknowledgment: “This  
product includes software developed by the OpenSSL  
Project for use in the OpenSSL Toolkit. (http:// www.  
openssl.org/)”  
4. The names “OpenSSL Toolkit” and “OpenSSL Project”  
must not be used to endorse or promote products derived  
from this software without prior written permission.  
For written permission, please contact openssl-core@  
openssl.org.  
5. Products derived from this software may not be called  
“OpenSSL” nor may “OpenSSL” appear in their names  
without prior written permission of the OpenSSL Project.  
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE  
LAW OR AGREED TO IN WRITING WILL ANY  
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO  
MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY  
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR  
DAMAGES, INCLUDING ANY GENERAL, SPECIAL,  
INCIDENTAL OR CONSEQUENTIAL DAMAGES  
ARISING OUT OF THE USE OR INABILITY TO USE THE  
LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS  
OF DATA OR DATA BEING RENDERED INACCURATE  
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES  
OR A FAILURE OF THE LIBRARY TO OPERATE WITH  
ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER  
OR OTHER PARTY HAS BEEN ADVISED OF THE  
POSSIBILITY OF SUCH DAMAGES.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. Redistributions of any form whatsoever must retain  
the following acknowledgment: “This product includes  
software developed by the OpenSSL Project for use in the  
OpenSSL Toolkit (http://www.openssl.org/)”  
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS  
IS AND ANY EXPRESS OR IMPLIED WARRANTIES,  
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED  
WARRANTIES OF MERCHANTABILITY AND FITNESS  
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN  
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS  
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
THIS SOFTWARE IS PROVIDED BY THE OpenSSL  
PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED  
WARRANTIES, INCLUDING, BUT NOT LIMITED TO,  
THE IMPLIED WARRANTIES OF MERCHANTABILITY  
AND FITNESS FOR A PARTICULAR PURPOSE ARE  
DISCLAIMED. IN NO EVENT SHALL THE OpenSSL  
PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY  
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,  
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT  
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS  
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR  
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON  
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,  
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR  
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF  
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY  
OF SUCH DAMAGE. This product includes cryptographic  
software written by Eric Young ([email protected]). This  
product includes software written by Tim Hudson(tjh@  
cryptsoft.com).  
The licence and distribution terms for any publically available  
version or derivative of this code cannot be changed. i.e.  
this code cannot simply be copied and put under another  
distribution licence [including the GNU Public Licence.  
Original SSLEAY License  
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft. com)  
All rights reserved. This package is an SSL implementation  
written by Eric Young (eay@cryptsoft. com). The  
implementation was written so as to conform with Netscapes  
SSL. This library is free for commercial and non-commercial  
use as long as the following conditions are aheared to.  
The following conditions apply to all code found in this  
distribution, be it the RC4, RSA, lhash, DES, etc., code; not  
just the SSL code. The SSL documentation included with  
this distribution is covered by the same copyright terms  
except that the holder is Tim Hudson ([email protected]).  
Copyright remains Eric Youngs, and as such any Copyright  
notices in the code are not to be removed. If this package  
is used in a product, Eric Young should be given attribution  
as the author of the parts of the library used. This can be  
in the form of a textual message at program startup or in  
documentation (online or textual) provided with the package.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
1. Redistributions of source code must retain the copyright  
notice, this list of conditions and the following disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
3. All advertising materials mentioning features or use of this  
software must display the following acknowledgement:  
“This product includes cryptographic software written by Eric  
Young (eay@ cryptsoft.com)” The word ‘cryptographic’ can  
be left out if the rouines from the library being used are not  
cryptographic related :-).  
4. If you include any Windows specific code (or a derivative  
thereof) from the apps directory (application code) you  
must include an acknowledgement: “This product includes  
software written by Tim Hudson (tjh@ cryptsoft.com)”  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BSD License  
Some software components of this product incorporate source code covered under the BSD license as follows.  
Component Name  
License  
URL  
net-snmp-5.4  
BSD  
http://www.net-snmp.org/about/license.html  
lighttpd 1.4.25  
Game-ws  
BSD 2.0  
BSD 2.0  
BSD 2.0  
http://www.opensource.org/licenses/bsd-license.html  
MiniUPnP Project Client  
lighttpd is a secure, fast, compliant, and very flexible  
webserver that has been optimized for high-performance  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
environments. It has a very low memory footprint compared  
to other webservers and takes care of cpuload. Its advanced  
feature-set (FastCGI, CGI, Auth, Output-  
disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
3. All advertising materials mentioning features or use of this  
software must display the following acknowledgement:  
This product includes software developed by the  
Computer Science Department at University College  
London.  
4. Neither the name of the University nor of the Department  
may be used to endorse or promote products derived  
from this software without specific prior written  
permission.  
Compression, URL-Rewriting and many more) make lighttpd  
the perfect webserver-software for every server that suffers  
load problems. Simple Network Management Protocol  
(SNMP) is an Internetstandard protocol for managing devices  
on IP networks. It is used mostly in network management  
systems to monitor the devices attached to the network for  
conditions that need administrative attention. Net-SNMP is a  
suite of applications used to implement SNMP v1, SNMP v2c  
and SNMP v3 using both IPv4 and IPv6. For more additional  
information, send email to [email protected].  
Copyright (C) 2004, Kneschke, incremental  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met :  
- Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer.  
- Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
- Neither the name of the ‘incremental’ nor the names  
of its contributors may be used to endorse or promote  
products derived from this software without specific prior  
written permission.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS “AS IS” AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT OWNER OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND  
CONTRIBUTORS ``AS ISAND ANY EXPRESSED OR  
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,  
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND  
FITNESS FOR A PARTICULAR PURPOSEARE DISCLAIMED.  
IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS  
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Copyright (c) 1991, 1993 The Regents of the University of  
California.  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
3. Neither the name of the Regents of the University of  
California nor the names of its contributors may be used  
to endorse or promote products derived from this software  
without specific prior written permission.  
Copyright (c) 1998-2001 University College London  
All rights reserved.  
Redistribution and use in source and binary forms, with or  
without modification, is permitted provided that the following  
conditions are met :  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS "AS IS" AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT OWNER OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS "AS IS" AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT OWNER OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Copyright (c) 2006, Creative Labs Inc  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
3. Neither the name of the Creative Labs nor the names  
of its contributors may be used to endorse or promote  
products derived from this software without specific prior  
written permission.  
Various copyrights apply to this package, listed in various  
separate parts below. Please make sure that you read all the  
parts.  
Part 1: CMU/UCD copyright notice: (BSD like)  
Copyright 1989, 1991, 1992 by Carnegie Mellon University  
Derivative Work - 1996, 1998-2000  
Copyright 1996, 1998-2000 The Regents of the University of  
California  
All Rights Reserved  
Permission to use, copy, modify and distribute this software  
and its documentation for any purpose and without fee is  
hereby granted, provided that the above copyright notice  
appears in all copies and that both that copyright notice and  
this permission notice appear in supporting documentation,  
and that the name of CMU and The Regents of the University  
of California not be used in advertising or publicity pertaining  
to distribution of the software without specific written  
permission.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS "AS IS" AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT OWNER OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Copyright (c) 2005-2012, Thomas BERNARD  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution.  
CMU AND THE REGENTS OF THE UNIVERSITY OF  
CALIFORNIA DISCLAIM ALL WARRANTIES WITH  
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED  
WARRANTIES OF MERCHANTABILITY AND FITNESS.  
IN NO EVENT SHALL CMU OR THE REGENTS OF THE  
UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY  
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES  
OR ANY DAMAGES WHATSOEVER RESULTING FROM  
THE LOSS OF USE, DATA OR PROFITS, WHETHER IN  
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER  
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION  
WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.  
Part 2: Networks Associates Technology, Inc copyright  
notice (BSD)  
Copyright (c) 2001-2003, Networks Associates Technology,  
Inc  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met: yy Redistributions of source  
code must retain the above copyright notice, this list of  
conditions and the following  
disclaimer. yy Redistributions in binary form must reproduce  
the above copyright notice, this list of conditions and the  
following disclaimer in the documentation and/or other  
materials provided with the distribution. yy Neither the name  
of the Networks Associates Technology, Inc nor the names of  
its contributors may be used to endorse or promote products  
derived from this software without specific prior written  
permission.  
3. Neither the name of Thomas BERNARD nor the names  
of its contributors may be used to endorse or promote  
products derived from this software without specific prior  
written permission.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS “AS IS” AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS “AS IS” AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Part 3: Cambridge Broadband Ltd. copyrightnotice (BSD)  
Part 5: Sparta, Inc copyright notice (BSD)  
Copyright (c) 2003-2009, Sparta, Inc  
All rights reserved.  
Portions of this code are copyright (c) 2001-2003, Cambridge  
Broadband Ltd.  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met: yy Redistributions of source  
code must retain the above copyright notice, this list of  
conditions and the following disclaimer. yy Redistributions  
in binary form must reproduce the above copyright notice,  
this list of conditions and the following disclaimer in the  
documentation and/or other materials provided with the  
distribution. yy Neither the name of Sparta, Inc nor the names  
of its contributors may be used to endorse or promote  
products derived from this software without specific prior  
written permission.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met: yy Redistributions of source  
code must retain the above copyright notice, this list of  
conditions and the following disclaimer. yy Redistributions  
in binary form must reproduce the above copyright notice,  
this list of conditions and the following disclaimer in the  
documentation and/or other materials provided with the  
distribution. yy The name of Cambridge Broadband Ltd. may  
not be used to endorse or promote products derived from  
this software without specific prior written permission.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDER “AS IS” AND ANY EXPRESS OR IMPLIED  
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE  
IMPLIED WARRANTIES OF MERCHANTABILITY AND  
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  
IN NO EVENT SHALL THE COPYRIGHT HOLDER BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS “AS IS” AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Part 6: Cisco/BUPTNIC copyright notice (BSD)  
Copyright (c) 2004, Cisco, Inc and Information Network  
Center of Beijing University of Posts and Telecommunications.  
All rights reserved.  
Redistribution and use in source and binary forms, with or  
without modification, are permitted provided that the following  
conditions are met: yy Redistributions of source code must  
retain the above copyright notice, this list of conditions  
and the following disclaimer. yy Redistributions in binary  
form must reproduce the above copyright notice, this list of  
conditions and the following disclaimer in the documentation  
and/or other materials provided with the distribution. yy  
Neither the name of Cisco, Inc, Beijing University of Posts  
and Telecommunications, nor the names of their contributors  
may be used to endorse or promote products derived from  
this software without specific prior written permission.  
Part 4: Sun Microsystems, Inc. copyright notice  
(BSD)  
Copyright (c) 2003 Sun Microsystems, Inc., 4150 Network  
Circle, Santa Clara, California 95054, U.S.A.  
All rights reserved.  
Use is subject to license terms below. This distribution  
may include materials developed by third parties. Sun, Sun  
Microsystems, the Sun logo and Solaris are trademarks  
or registered trademarks of Sun Microsystems, Inc. in  
the U.S. and other countries. Redistribution and use in  
source and binary forms, with or without modification, are  
permitted provided that the following conditions are met:  
yy Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer. yy Redistributions in binary form must reproduce  
the above copyright notice, this list of conditions and the  
following disclaimer in the documentation and/or other  
materials provided with the distribution. yy Neither the  
name of the Sun Microsystems, Inc. nor the names of its  
contributors may be used to endorse or promote products  
derived from this software without specific prior written  
permission.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS “AS IS” AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
THIS SOFTWARE IS PROVIDED BY APPLE AND ITS  
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED  
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE  
IMPLIED WARRANTIES OF MERCHANTABILITY AND  
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  
IN NO EVENT SHALL APPLE OR ITSCONTRIBUTORS  
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Part 9: ScienceLogic, LLC copyright notice(BSD)  
Copyright (c) 2009, ScienceLogic, LLC  
All rights reserved.  
Part 7: Fabasoft R&D Software GmbH & Co KG copyright  
notice (BSD)  
Copyright (c) Fabasoft R&D Software GmbH & Co KG,  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions aremet: yy Redistributions of source  
code must retain the above copyright notice, this list of  
conditions and the following disclaimer. yy Redistributions  
in binary form must reproduce the above copyright notice,  
this list of conditions and the following disclaimer in the  
documentation and/or other materials provided with the  
distribution. yy Neither the name of ScienceLogic, LLC nor  
the names of its contributors may be used to endorse or  
promote products derived from this software without specific  
prior written permission.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDERS AND CONTRIBUTORS “AS IS” AND ANY  
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL  
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE  
Author: Bernhard Penz  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met: yy Redistributions of source  
code must retain the above copyright notice, this list of  
conditions and the following disclaimer. yy Redistributions  
in binary form must reproduce the above copyright notice,  
this list of conditions and the following disclaimer in the  
documentation and/or other materials provided with the  
distribution. yy The name of Fabasoft R&D Software GmbH  
& Co KG or any of its subsidiaries, brand or product names  
may not be used to endorse or promote products derived  
from this software without specific prior written permission.  
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT  
HOLDER “AS IS” AND ANY EXPRESS OR IMPLIED  
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE  
IMPLIED WARRANTIES OF MERCHANTABILITY AND  
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  
IN NO EVENT SHALL THE COPYRIGHT HOLDER BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES  
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,  
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER  
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER  
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING  
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT  
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGE.  
Part 8: Apple Inc. copyright notice (BSD)  
Copyright (c) 2007 Apple Inc.  
All rights reserved.  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the following  
disclaimer.  
2. Redistributions in binary form must reproduce the above  
copyright notice, this list of conditions and the following  
disclaimer in the documentation and/or other materials  
provided with the distribution. 3. Neither the name of  
Apple Inc. (“Apple”) nor the names of its contributors may  
be used to endorse or promote products derived from this  
software without specific prior written permission.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The MIT License  
Some software components of this product incorporate source code covered under the MIT license as follows  
MIT License 2.0  
- Acewidget, bettermeans, jquery-ui, libxml, libxml2, Mesa3D-MesaLib,mwEmbed,OpenGL Samples Pack, Wide Studio,  
xorg-server  
Copyright (c) 2011, The Dojo Foundation  
Copyright 2010, AUTHORS.txt (http://jqueryui.com/about)  
Dual licensed under the MIT or GPL Version 2 licenses.  
- http://jquery.org/license  
- http://docs.jquery.com/UI/Widget  
Copyright Daniel Veillard  
Copyright Igor Zlatovic <[email protected]>  
Copyright Aleksey Sanin  
Copyright Gary Pennington <Gary.[email protected]>  
Copyright Alfred Mickautsch <[email protected]>  
Copyright Bjorn Reese <[email protected]>  
Copyright Joel W. Reed  
Copyright William Brack <[email protected]>  
Copyright (c) 2007-2010 The Khronos Group Inc.  
Copyright Atish Kumar Patra  
Permission is hereby granted, free of charge, to any  
person obtaining a copy of this software and associated  
documentation files (the "Software"), to deal in the Software  
without restriction, including without limitation the rights to  
use, copy, modify, merge, publish, distribute, sublicense,  
and/or sell copies of the Software, and to permit persons  
to whom the Software is furnished to do so, subject to the  
following conditions:  
The above copyright notice and this permission notice  
shall be included in all copies or substantial portions of the  
Software.  
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT  
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,  
INCLUDING BUT NOT LIMITED TO THE WARRANTIES  
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR  
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL  
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR  
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER  
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,  
ARISING FROM, OUT OF OR IN CONNECTION WITH THE  
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE  
SOFTWARE.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The Independent JPEG Group’s JPEG Software  
The software included in this product contains copyrighted software that is licensed under the JPEG license.  
JPEG license  
-
Code project – Generating Outline OpenGL, Libjpeg  
This distribution contains the sixth public release of the  
Independent JPEG Groups free JPEG software. You are  
welcome to redistribute this software and to use it for any  
purpose, subject to the conditions under LEGAL ISSUES, below.  
Serious users of this software (particularly those incorporating  
it into larger programs) should contact IJG at jpeg-info@  
uunet.uu.net to be added to our electronic mailing list. Mailing  
list members are notified of updates and have a chance to  
participate in technical discussions, etc.  
Permission is NOT granted for the use of any IJG authors  
name or company name in advertising or publicity relating  
to this software or products derived from it. This software  
may be referred to only as "the Independent JPEG Groups  
software".  
We specifically permit and encourage the use of this  
software as the basis of commercial products, provided that  
all warranty or liability claims are assumed by the product  
vendor.  
This software is the work of Tom Lane, Philip Gladstone, Jim  
Boucher, Lee Crocker, Julian Minguillon, Luis Ortiz, George  
Phillips, Davide Rossi, Guido Vollbeding, Ge’ Weijers, and  
other members of the Independent JPEG Group.  
ansi2knr.c is included in this distribution by permission of L.  
Peter Deutsch, sole proprietor of its copyright holder, Aladdin  
Enterprises of Menlo Park, CA. ansi2knr.c is NOT covered by  
the above copyright and conditions, but instead by the usual  
distribution terms of the Free Software Foundation; principally,  
that you must include source code if you redistribute it. (See  
the file ansi2knr.c for full details.) However, since ansi2knr.  
c is not needed as part of any program generated from the  
IJG code, this does not limit you more than the foregoing  
paragraphs do.  
The Unix configuration script "configure" was produced  
with GNU Autoconf. It is copyright by the Free Software  
Foundation but is freely distributable. The same holds for its  
supporting scripts (config.guess, config.sub, ltconfig, ltmain.  
sh). Another support script, install-sh, is copyright by M.I.T.  
but is also freely distributable.  
It appears that the arithmetic coding option of the JPEG spec  
is covered by patents owned by IBM, AT&T, and Mitsubishi.  
Hence arithmetic coding cannot legally be used without  
obtaining one or more licenses. For this reason, support for  
arithmetic coding has been removed from the free JPEG  
software. (Since arithmetic coding provides only a marginal  
gain over the unpatented Huffman mode, it is unlikely that  
very many implementations will support it.) So far as we are  
aware, there are no patent restrictions on the remaining code.  
The IJG distribution formerly included code to read and write  
GIF files. To avoid entanglement with the Unisys LZW patent,  
GIF reading support has been removed altogether, and the  
GIF writer has been simplified to produce "uncompressed  
GIFs". This technique does not use the LZW algorithm; the  
resulting GIF files are larger than usual, but are readable by  
all standard GIF decoders.  
We are required to state that  
"The Graphics Interchange Format(c) is the Copyright  
property of CompuServe Incorporated. GIF(sm) is a Service  
Mark property of CompuServe Incorporated."  
IJG is not affiliated with the official ISO JPEG standards  
committee.  
LEGAL ISSUES  
============  
In plain English:  
1. We don’t promise that this software works. (But if you find  
any bugs, please let us know!)  
2. You can use this software for whatever you want. You  
don’t have to pay us.  
3. You may not pretend that you wrote this software. If you  
use it in a program, you must acknowledge somewhere in  
your documentation that you’ve used the IJG code.  
In legalese:  
The authors make NO WARRANTY or representation, either  
express or implied, with respect to this software, its quality,  
accuracy, merchantability, or fitness for a particular purpose.  
This software is provided "AS IS", and you, its user, assume  
the entire risk as to its quality and accuracy.  
This software is copyright (C) 1991-1998, Thomas G. Lane.  
All Rights Reserved except as specified below.  
Permission is hereby granted to use, copy, modify, and  
distribute this software (or portions thereof) for any purpose,  
without fee, subject to these conditions:  
(1) If any part of the source code for this software is  
distributed, then this README file must be included, with  
this copyright and no-warranty notice unaltered; and any  
additions, deletions, or changes to the original files must be  
clearly indicated in accompanying documentation.  
(2) If only executable code is distributed, then the  
accompanying documentation must state that "this software  
is based in part on the work of the Independent JPEG  
Group".  
(3) Permission for use of this software is granted only if  
the user accepts full responsibility for any undesirable  
consequences; the authors accept NO LIABILITY for  
damages of any kind.  
These conditions apply to any software derived from or  
based on the IJG code, not just to the unmodified library. If  
you use our work, you ought to acknowledge us.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Mozilla Public License  
Since we, at Samsung Techwin, used the Mozilla Firefox component without modifying the source code according to the  
MOZILLA Public license 1.1, we are not obliged to provide the source code of the corresponding component.  
Version 1.1  
1. Definitions.  
1.12. "You(or "Your") means an individual or a legal entity  
exercising rights under, and complying with all of the terms of,  
this License or a future version of this License issued under  
Section 6.1. For legal entities, "Youincludes any entity which  
controls, is controlled by, or is under common control with You.  
For purposes of this definition, "controlmeans (a) the power,  
direct or indirect, to cause the direction or management of  
such entity, whether by contract or otherwise, or (b) ownership  
of more than fifty percent (50%) of the outstanding shares or  
beneficial ownership of such entity.  
1.0.1. "Commercial Use" means distribution or otherwise  
making the Covered Code available to a third party.  
1.1. ‘’Contributormeans each entity that creates or contributes  
to the creation of Modifications.  
1.2. ‘’Contributor Versionmeans the combination of the  
Original Code, prior Modifications used by a Contributor, and the  
Modifications made by that particular Contributor.  
1.3. ‘’Covered Codemeans the Original Code or Modifications  
or the combination of the Original Code and Modifications, in  
each case including portions thereof.  
2. Source Code License.  
2.1. The Initial Developer Grant. The Initial Developer hereby  
grants You a world-wide, royalty-free, non-exclusive license,  
subject to third party intellectual property claims:  
(a) under intellectual property rights (other than patent  
or trademark) Licensable by Initial Developer to use,  
reproduce, modify, display, perform, sublicense and  
distribute the Original Code (or portions thereof) with  
or without Modifications, and/or as part of a Larger  
Work; and  
(b) under Patents Claims infringed by the making, using  
or selling of Original Code, to make, have made, use,  
practice, sell, and offer for sale, and/or otherwise dispose  
of the Original Code (or portions thereof).  
(c) the licenses granted in this Section 2.1(a) and (b) are  
effective on the date Initial Developer first distributes  
Original Code under the terms of this License.  
1.4. ‘’Electronic Distribution Mechanismmeans a mechanism  
generally accepted in the software development community for  
the electronic transfer of data.  
1.5. ‘’Executablemeans Covered Code in any form other than  
Source Code.  
1.6. ‘’Initial Developermeans the individual or entity identified  
as the Initial Developer in the Source Code notice required by  
Exhibit A.  
1.7. ‘’Larger Workmeans a work which combines Covered  
Code or portions thereof with code not governed by the terms  
of this License.  
1.8. ‘’Licensemeans this document.  
1.8.1. "Licensable" means having the right to grant, to the  
maximum extent possible, whether at the time of the initial grant  
or subsequently acquired, any and all of the rights conveyed  
herein.  
(d) Notwithstanding Section 2.1(b) above, no patent license  
is granted: 1) for code that You delete from the Original  
Code; 2) separate from the Original Code; or 3) for  
infringements caused by: i) the modification of the Original  
Code or ii) the combination of the Original Code with  
other software or devices.  
1.9. ‘’Modificationsmeans any addition to or deletion from  
the substance or structure of either the Original Code or any  
previous Modifications. When Covered Code is released as a  
series of files, a Modification is:  
2.2. Contributor Grant. Subject to third party intellectual property  
claims, each Contributor hereby grants You a world-wide,  
royalty-free, non-exclusive license  
A. Any addition to or deletion from the contents of a file  
containing Original Code or previous Modifications.  
B. Any new file that contains any part of the Original Code or  
previous Modifications.  
(a) under intellectual property rights (other than patent or  
trademark) Licensable by Contributor, to use, reproduce,  
modify, display, perform, sublicense and distribute the  
Modifications created by such Contributor (or portions  
thereof) either on an unmodified basis, with other  
Modifications, as Covered Code and/or as part of a  
Larger Work; and  
1.10. ‘’Original Codemeans Source Code of computer  
software code which is described in the Source Code notice  
required by Exhibit A as Original Code, and which, at the time  
of its release under this License is not already Covered Code  
governed by this License.  
(b) under Patent Claims infringed by the making, using, or  
selling of Modifications made by that Contributor either  
alone and/or in combination with its Contributor Version  
(or portions of such combination), to make, use, sell,  
offer for sale, have made, and/or otherwise dispose of:  
1) Modifications made by that Contributor (or portions  
thereof); and 2) the combination of Modifications made  
by that Contributor with its Contributor Version (or  
portions of such combination).  
1.10.1. "Patent Claims" means any patent claim(s), now owned  
or hereafter acquired, including without limitation, method,  
process, and apparatus claims, in any patent Licensable by  
grantor.  
1.11. ‘’Source Codemeans the preferred form of the Covered  
Code for making modifications to it, including all modules it  
contains, plus any associated interface definition files, scripts  
used to control compilation and installation of an Executable, or  
source code differential comparisons against either the Original  
Code or another well known, available Covered Code of the  
Contributors choice. The Source Code can be in a compressed  
or archival form, provided the appropriate decompression or  
de-archiving software is widely available for no charge.  
(c) the licenses granted in Sections 2.2(a) and 2.2(b) are  
effective on the date Contributor first makes Commercial  
Use of the Covered Code.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(d) Notwithstanding Section 2.2(b) above, no patent license is  
granted: 1) for any code that Contributor has deleted from  
the Contributor Version; 2) separate from the Contributor  
Version; 3) for infringements caused by: i) third party  
modifications of Contributor Version or ii) the combination of  
Modifications made by that Contributor with other software  
(except as part of the Contributor Version) or other devices;  
or 4) under Patent Claims infringed by Covered Code in the  
absence of Modifications made by that Contributor.  
Contributor represents that, except as disclosed pursuant to  
Section 3.4(a) above, Contributor believes that Contributors  
Modifications are Contributors original creation(s) and/or  
Contributor has sufficient rights to grant the rights conveyed by  
this License.  
3.5. Required Notices. You must duplicate the notice in Exhibit  
A in each file of the Source Code. If it is not possible to put  
such notice in a particular Source Code file due to its structure,  
then You must include such notice in a location (such as a  
relevant directory) where a user would be likely to look for such a  
notice. If You created one or more Modification(s) You may add  
your name as a Contributor to the notice described in Exhibit  
A. You must also duplicate this License in any documentation  
for the Source Code where You describe recipients’ rights or  
ownership rights relating to Covered Code. You may choose  
to offer, and to charge a fee for, warranty, support, indemnity or  
liability obligations to one or more recipients of Covered Code.  
However, You may do so only on Your own behalf, and not on  
behalf of the Initial Developer or any Contributor. You must make  
it absolutely clear than any such warranty, support, indemnity or  
liability obligation is offered by You alone, and You hereby agree  
to indemnify the Initial Developer and every Contributor for any  
liability incurred by the Initial Developer or such Contributor as a  
result of warranty, support, indemnity or liability terms You offer.  
3. Distribution Obligations.  
3.1. Application of License. The Modifications which You create  
or to which You contribute are governed by the terms of this  
License, including without limitation Section 2.2. The Source  
Code version of Covered Code may be distributed only under  
the terms of this License or a future version of this License  
released under Section 6.1, and You must include a copy of this  
License with every copy of the Source Code You distribute. You  
may not offer or impose any terms on any Source Code version  
that alters or restricts the applicable version of this License or  
the recipients’ rights hereunder. However, You may include an  
additional document offering the additional rights described in  
Section 3.5.  
3.2. Availability of Source Code. Any Modification which You  
create or to which You contribute must be made available in  
Source Code form under the terms of this License either on  
the same media as an Executable version or via an accepted  
Electronic Distribution Mechanism to anyone to whom you  
made an Executable version available; and if made available  
via Electronic Distribution Mechanism, must remain available  
for at least twelve (12) months after the date it initially became  
available, or at least six (6) months after a subsequent version  
of that particular Modification has been made available to such  
recipients. You are responsible for ensuring that the Source  
Code version remains available even if the Electronic Distribution  
Mechanism is maintained by a third party.  
3.6. Distribution of Executable Versions. You may distribute  
Covered Code in Executable form only if the requirements of  
Section 3.1-3.5 have been met for that Covered Code, and if  
You include a notice stating that the Source Code version of  
the Covered Code is available under the terms of this License,  
including a description of how and where You have fulfilled the  
obligations of Section 3.2. The notice must be conspicuously  
included in any notice in an Executable version, related  
documentation or collateral in which You describe recipients’  
rights relating to the Covered Code. You may distribute the  
Executable version of Covered Code or ownership rights under  
a license of Your choice, which may contain terms different from  
this License, provided that You are in compliance with the terms  
of this License and that the license for the Executable version  
does not attempt to limit or alter the recipients rights in the  
Source Code version from the rights set forth in this License. If  
You distribute the Executable version under a different license  
You must make it absolutely clear that any terms which differ  
from this License are offered by You alone, not by the Initial  
Developer or any Contributor. You hereby agree to indemnify the  
Initial Developer and every Contributor for any liability incurred by  
the Initial Developer or such Contributor as a result of any such  
terms You offer.  
3.3. Description of Modifications. You must cause all Covered  
Code to which You contribute to contain a file documenting the  
changes You made to create that Covered Code and the date  
of any change. You must include a prominent statement that the  
Modification is derived, directly or indirectly, from Original Code  
provided by the Initial Developer and including the name of the  
Initial Developer in (a) the Source Code, and (b) in any notice in  
an Executable version or related documentation in which You  
describe the origin or ownership of the Covered Code.  
3.4. Intellectual Property Matters  
(a) Third Party Claims. If Contributor has knowledge that a  
license under a third partys intellectual property rights is  
required to exercise the rights granted by such Contributor  
under Sections 2.1 or 2.2, Contributor must include a text  
file with the Source Code distribution titled "LEGAL’’ which  
describes the claim and the party making the claim in  
sufficient detail that a recipient will know whom to contact.  
If Contributor obtains such knowledge after the Modification  
is made available as described in Section 3.2, Contributor  
shall promptly modify the LEGAL file in all copies Contributor  
makes available thereafter and shall take other steps (such as  
notifying appropriate mailing lists or newsgroups) reasonably  
calculated to inform those who received the Covered Code  
that new knowledge has been obtained.  
3.7. Larger Works. You may create a Larger Work by combining  
Covered Code with other code not governed by the terms of  
this License and distribute the Larger Work as a single product.  
In such a case, You must make sure the requirements of this  
License are fulfilled for the Covered Code.  
4. Inability to Comply Due to Statute or Regulation.  
If it is impossible for You to comply with any of the terms of this  
License with respect to some or all of the Covered Code due to  
statute, judicial order, or regulation then You must: (a) comply  
with the terms of this License to the maximum extent possible;  
and (b) describe the limitations and the code they affect. Such  
description must be included in the LEGAL file described in  
Section 3.4 and must be included with all distributions of the  
Source Code. Except to the extent prohibited by statute or  
regulation, such description must be sufficiently detailed for a  
recipient of ordinary skill to be able to understand it.  
(b) Contributor APIs. If Contributors Modifications include  
an application programming interface and Contributor  
has knowledge of patent licenses which are reasonably  
necessary to implement that API, Contributor must also  
include this information in the LEGAL file.  
(c) Representations.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5. Application of this License.  
upon in writing by the parties or the litigation claim is not  
withdrawn, the rights granted by Participant to You under  
Sections 2.1 and/or 2.2 automatically terminate at the  
expiration of the 60 day notice period specified above.  
This License applies to code to which the Initial Developer has  
attached the notice in Exhibit A and to related Covered Code.  
6. Versions of the License.  
(b) any software, hardware, or device, other than such  
Participants Contributor Version, directly or indirectly  
infringes any patent, then any rights granted to You by  
such Participant under Sections 2.1(b) and 2.2(b) are  
revoked effective as of the date You first made, used, sold,  
distributed, or had made, Modifications made by that  
Participant.  
6.1. New Versions. Netscape Communications Corporation  
(‘’Netscape) may publish revised and/or new versions of  
the License from time to time. Each version will be given a  
distinguishing version number.  
6.2. Effect of New Versions. Once Covered Code has been  
published under a particular version of the License, You may  
always continue to use it under the terms of that version. You  
may also choose to use such Covered Code under the terms of  
any subsequent version of the License published by Netscape.  
No one other than Netscape has the right to modify the terms  
applicable to Covered Code created under this License.  
8.3. If You assert a patent infringement claim against Participant  
alleging that such Participants Contributor Version directly or  
indirectly infringes any patent where such claim is resolved  
(such as by license or settlement) prior to the initiation of patent  
infringement litigation, then the reasonable value of the licenses  
granted by such Participant under Sections 2.1 or 2.2 shall be  
taken into account in determining the amount or value of any  
payment or license.  
6.3. Derivative Works. If You create or use a modified version  
of this License (which you may only do in order to apply it to  
code which is not already Covered Code governed by this  
License), You must (a) rename Your license so that the phrases  
‘’Mozilla, ‘’MOZILLAPL, ‘’MOZPL, ‘’Netscape, "MPL", ‘’NPL’’  
or any confusingly similar phrase do not appear in your license  
(except to note that your license differs from this License) and (b)  
otherwise make it clear that Your version of the license contains  
terms which differ from the Mozilla Public License and Netscape  
Public License. (Filling in the name of the Initial Developer,  
Original Code or Contributor in the notice described in Exhibit  
A shall not of themselves be deemed to be modifications of this  
License.)  
8.4. In the event of termination under Sections 8.1 or 8.2  
above, all end user license agreements (excluding distributors  
and resellers) which have been validly granted by You or  
any distributor hereunder prior to termination shall survive  
termination.  
9. LIMITATION OF LIABILITY.  
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL  
THEORY, WHETHER TORT (INCLUDING NEGLIGENCE),  
CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL  
DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY  
DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF  
ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR  
ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL  
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT  
LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK  
STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR  
ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES,  
EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF  
THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION  
OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH  
OR PERSONAL INJURY RESULTING FROM SUCH PARTY’S  
NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS  
SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW  
THE EXCLUSION OR LIMITATION OF INCIDENTAL OR  
CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND  
LIMITATION MAY NOT APPLY TO YOU. 10. U.S. GOVERNMENT  
END USERS.  
7. DISCLAIMER OF WARRANTY.  
COVERED CODE IS PROVIDED UNDER THIS LICENSE ON  
AN "AS ISBASIS, WITHOUT WARRANTY OF ANY KIND,  
EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT  
LIMITATION, WARRANTIES THAT THE COVERED CODE  
IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A  
PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE  
RISK AS TO THE QUALITY AND PERFORMANCE OF THE  
COVERED CODE IS WITH YOU. SHOULD ANY COVERED  
CODE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT  
THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR)  
ASSUME THE COST OF ANY NECESSARY SERVICING,  
REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY  
CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO  
USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER  
EXCEPT UNDER THIS DISCLAIMER.  
8. TERMINATION.  
The Covered Code is a ‘’commercial item,as that term  
is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of  
‘’commercial computer softwareand ‘’commercial computer  
software documentation,as such terms are used in 48 C.F.R.  
12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48  
C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S.  
Government End Users acquire Covered Code with only those  
rights set forth herein.  
8.1. This License and the rights granted hereunder will  
terminate automatically if You fail to comply with terms herein  
and fail to cure such breach within 30 days of becoming aware  
of the breach. All sublicenses to the Covered Code which are  
properly granted shall survive any termination of this License.  
Provisions which, by their nature, must remain in effect beyond  
the termination of this License shall survive.  
8.2. If You initiate litigation by asserting a patent infringement  
claim (excluding declatory judgment actions) against Initial  
Developer or a Contributor (the Initial Developer or Contributor  
against whom You file such action is referred to as "Participant")  
alleging that:  
(a) such Participants Contributor Version directly or indirectly  
infringes any patent, then any and all rights granted by such  
Participant to You under Sections 2.1 and/or 2.2 of this  
License shall, upon 60 days notice from Participant terminate  
prospectively, unless if within 60 days after receipt of notice  
You either: (i) agree in writing to pay Participant a mutually  
agreeable reasonable royalty for Your past and future use of  
Modifications made by such Participant, or (ii) withdraw Your  
litigation claim with respect to the Contributor Version against  
such Participant. If within 60 days of notice, a reasonable  
royalty and payment arrangement are not mutually agreed  
11. MISCELLANEOUS.  
This License represents the complete agreement concerning  
subject matter hereof. If any provision of this License is held  
to be unenforceable, such provision shall be reformed only to  
the extent necessary to make it enforceable. This License shall  
be governed by California law provisions (except to the extent  
applicable law, if any, provides otherwise), excluding its conflict-  
of-law provisions. With respect to disputes in which at least one  
party is a citizen of, or an entity chartered or registered to do  
business in the United States of America, any litigation relating  
to this License shall be subject to the jurisdiction of the Federal  
Courts of the Northern District of California, with venue lying in  
Santa Clara County, California, with the losing party responsible  
for costs, including without limitation, court costs and reasonable  
attorneys’ fees and expenses. The application of the United  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Nations Convention on Contracts for the International Sale  
of Goods is expressly excluded. Any law or regulation which  
provides that the language of a contract shall be construed  
against the drafter shall not apply to this License.  
12. RESPONSIBILITY FOR CLAIMS.  
As between Initial Developer and the Contributors, each party is  
responsible for claims and damages arising, directly or indirectly,  
out of its utilization of rights under this License and You agree to  
work with Initial Developer and Contributors to distribute such  
responsibility on an equitable basis. Nothing herein is intended  
or shall be deemed to constitute any admission of liability.  
13. MULTIPLE-LICENSED CODE.  
Initial Developer may designate portions of the Covered Code  
as Multiple-Licensed. Multiple-Licensedmeans that the Initial  
Developer permits you to utilize portions of the Covered Code  
under Your choice of the MPL or the alternative licenses, if any,  
specified by the Initial Developer in the file described in Exhibit A.  
EXHIBIT A -Mozilla Public License.  
``The contents of this file are subject to the Mozilla Public License  
Version 1.1 (the "License"); you may not use this file except in  
compliance with the License. You may obtain a copy of the  
License at http://www.mozilla.org/MPL/  
Software distributed under the License is distributed on an "AS  
IS" basis, WITHOUT WARRANTY OF ANY KIND, either express  
or implied. See the License for the specific language governing  
rights and limitations under the License.  
The Original Code is ___________________________________.  
The Initial Developer of the Original Code is  
________________________. Portions created by  
______________________ are Copyright (C) ______  
_______________________. All Rights Reserved.  
Contributor(s): ______________________________________.  
Alternatively, the contents of this file may be used under the  
terms of the _____ license (the [___] License), in which case the  
provisions of [______] License are applicable instead of those  
above. If you wish to allow use of your version of this file only  
under the terms of the [____] License and not to allow others to  
use your version of this file under the MPL, indicate your decision  
by deleting the provisions above and replace them with the  
notice and other provisions required by the [___] License. If you  
do not delete the provisions above, a recipient may use your  
version of this file under either the MPL or the [___] License."  
[NOTE: The text of this Exhibit A may differ slightly from the text  
of the notices in the Source Code files of the Original Code. You  
should use the text of this Exhibit A rather than the text found in  
the Original Code Source Code for Your Modifications  
Download from Www.Somanuals.com. All Manuals Search And Download.  
This equipment has been tested and found to comply with the limits for a  
Class A digital device, pursuant to part 15 of the FCC Rules. These limits are  
designed to provide reasonable protection against harmful interference when  
the equipment is operated in a commercial environment.  
This equipment generates, uses, and can radiate radio frequency energy and,  
if not installed and used in accordance with the instruction manual, may cause  
harmful interference to radio communications. Operation of this equipment in a  
residential area is likely to cause harmful interference in which case the user will  
be required to correct the interference at his own expense.  
Samsung Techwin cares for the environment at all product manufacturing stages, and is  
taking measures to provide customers with more environmentally friendly products.  
The Eco mark represents Samsung Techwin’s devotion to creating environmentally friendly  
products, and indicates that the product satisfies the EU RoHS Directive.  
Correct Disposal of This Product (Waste Electrical & Electronic Equipment)  
(Applicable in the European Union and other European countries with separate collection systems)  
This marking on the product, accessories or literature indicates that the product and its  
electronic accessories (e.g. charger, headset, USB cable) should not be disposed of with other  
household waste at the end of their working life. To prevent possible harm to the environment or  
human health from uncontrolled waste disposal, please separate these items from other types  
of waste and recycle them responsibly to promote the sustainable reuse of material resources.  
Household users should contact either the retailer where they purchased this product, or  
their local government office, for details of where and how they can take these items for  
environmentally safe recycling.  
Business users should contact their supplier and check the terms and conditions of the  
purchase contract. This product and its electronic accessories should not be mixed with other  
commercial wastes for disposal.  
Correct disposal of batteries in this product  
(Applicable in the European Union and other European countries with separate battery return systems.)  
This marking on the battery, manual or packaging indicates that the batteries in this product should  
not be disposed of with other household waste at the end of their working life. Where marked, the  
chemical symbols Hg, Cd or Pb indicate that the battery contains mercury, cadmium or lead above the  
reference levels in EC Directive 2006/66. If batteries are not properly disposed of, these substances  
can cause harm to human health or the environment.  
To protect natural resources and to promote material reuse, please separate batteries from other types  
of waste and recycle them through your local, free battery return system.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SALES NETWORK  
SAMSUNG TECHWIN CO., LTD.  
Samsungtechwin R&D Center, 701, Sampyeong-dong, Bundang-gu, Seongnam-si, Gyeonggi-do, Korea, 463-400  
TEL : +82-70-7147-8740~60 FAX : +82-31-8018-3745  
SAMSUNG TECHWIN AMERICA Inc.  
SAMSUNG TECHWIN EUROPE LTD.  
100 Challenger Rd. Suite 700 Ridgefield Park, NJ 07660  
Toll Free : +1-877-213-1222 Direct : +1-201-325-6920  
Fax : +1-201-373-0124  
Samsung House, 1000 Hillswood Drive, Hillswood Business  
Park Chertsey, Surrey, UNITED KINGDOM KT16 OPS  
TEL : +44-1932-45-5300 FAX : +44-1932-45-5325  
www.samsungcctvusa.com  
www.samsungtechwin.com  
www.samsungsecurity.com  
www.samsungipolis.com  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Q Logic Server 4100 User Guide
Radio Shack Network Card 273 355 User Guide
RCA Flat Panel Television J32L637 H 0 User Guide
Ryobi Power Hammer SDS60 User Guide
Ryobi Trimmer CS26 RY28020 User Guide
Samsung Computer Drive 16MB User Guide
Samsung DVD Player CACA AK68 00427C01 User Guide
Samsung MP3 Player YP S3 User Guide
Sanyo CRT Television AVM 3259S User Guide
Sanyo Stereo System DC MP9500 User Guide