HD-CCTV DVR
Full HD Digital Video Recorder
HS1600F-D / HSC1601F-D / HSC801F-D
User’s Manual
(EN Rev 1.7)
0
HD-CCTV DVR
Install & User Guide
HD-CCTV DVR Manual.
Thank you for purchasing a Webgate Digital Video Recorder.
Before installation or operation please become familiar with the user manual and other referenced
manuals mentioned in the booklet.
User manual, software and hardware described here are protected by copyright by law. With the
exception of copying for general use within fair use, copying and reprinting of the user manual, either
partially or in entirety, or translating it into any another language without the consent of our
Corporate office is strictly prohibited.
Product Warranty and Limited Responsibility
The manufacturer does not assume any responsibility concerning the sale of this product and does not
delegate any right to any third party to take any responsibility on its behalf. The product warranty does
not cover cases of accidents, negligence, alteration, misuse or abuse. No warranty is offered for any
attachments or parts not supplied by the manufacturer.
The manufacturer does not assume any responsibility for followings






Malfunctions due to negligence by user
Deliberate disassembly and replacement by user
Connection of power source other than a properly rated power source
Malfunctions caused by natural disasters (fire, flood, tidal wave, etc)
The warranty period for HDD is one year
Any data damage due to HDD damage
The product is not for exclusive use of crime prevention but for assistance in cases as fire or
theft. We take no responsibility for damage from any incident.
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC
Rules.
These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a
commercial environment.
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the
instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause
harmful interference in which case the user will be required to correct the interference at his own expense.
Correct Disposal of This Product
(Waste Electrical & Electronic Equipment)
(Applicable in the European Union and other European countries with separate collection systems)
This marking on the product, accessories or literature indicates that the product and its electronic accessories (e.g. charger,
headset, USB
cable) should not be disposed of with other household waste at the end of their working life. To prevent possible harm to the
environment or human health from uncontrolled waste disposal, please separate these items from other types of waste and
recycle them responsibly to promote the sustainable reuse of material resources.
Household users should contact either the retailer where they purchased this product or their local government office, for
details of where and how they can take these items for environmentally safe recycling.
Business users should contact their supplier and check the terms and conditions of the purchase contract. This product and its
electronic accessories should not be mixed with other commercial wastes for disposal.
Correct disposal of batteries in this product
(Applicable in the European Union and other European countries with separate battery return systems.)
This marking on the battery, manual or packaging indicates that the batteries in this product should not be disposed of with
other household waste at the end of their working life. Where marked, the chemical symbols Hg, Cd or Pb indicate that the
battery contains mercury, cadmium or lead above the reference levels in EC Directive 2006/66. If batteries are not properly
disposed of, these substances can cause harm to human health or the environment.
To protect natural resources and to promote material reuse, please separate batteries from other types of waste and recycle
them through your local, free battery return system.
Copyright ©2016 DAEMYUNG CORPORATION. All rights reserved.
1
Introduction
Warning
Warning
 Please do not bend or press power cord by force which could lead to fire.
 Be careful not to pull or plug with wet hands to avoid fire or electric shock.
 In case of changing built-in lithium battery, it should be replaced with same brand or similar one to
prevent a danger of explosion. Since old batteries could be a factor of environment contamination, please
disposed of them properly.
 Do not throw the batteries in fire or heating units. Neither short circuit nor disassembly is prohibited.
 Do not recharge battery used for remote controller.
 Do not open the top cover otherwise it could lead to electric shock and product damage.
 The previous recorded data is deleted if record continues when HDD is full so please check disk setup
status.
 Manufacturer takes no responsibility for any damaged data due to customer’s carelessness or negligence.
A-rated device(Broadcasting Communication Equipment for business use only)
Users/Sellers should under this is A-rated device for business use only and it must not be used outside of
family.
Caution
 Do not place heavy objects on top of the product.
 Product is for indoor use only and it is not water or damp proof. Use product to its environmental
specifications (Temperature & Humidity). To clean the product, gently wipe the outside with a clean dry
cloth.
 Product uses AC power of 110V ~ 240V. Be cautious not to cause electric damages to the product.
 Be careful not to drop the product. Physical shocks may harm the product including internal HDD. In
addition, please do not throw or drop it.
 Product is made of metal you can hurt another human if you throw or used as a weapon. Keep away
from the reach of children and install in a safe place.
 If Product does not operate properly, please contact the closest WEBGATE distributor for service.
Tampering or disassembling the product will void the warranty.
 The product can transmit real time video over network or internet and can be used for monitoring
purpose depending on installation sites. So please check and review related regulations before
installation.
Experience and technical skills are needed for the installation of this product. Improper installation may
cause fire, electric shocks, or defects. Contact the nearest Webgate dealer for installations.
Contents of the manual can differ according to firmware or Software upgrade, and the appearance of
products may be changed for the improvement of quality without an advance notice
◈ System power off
In case user turn off device by force while device is working, it could give damage on HDD and device so
please turn off device safely using power button located in the front panel. You should install a UPS system
for safe operation in order to prevent damage caused by an unexpected power failure.
◈ Working Temperature
The working temperature of the product is 5°C~45°C or 41°F~113°F. DVR may not work properly if left in
low temperature for a long period of time. If such is the case, then store at room temperature for some
time before using it again.
2
Contents
Introduction 2
Warning 2
Key Features 5
Specification by Models 7
Components 8
Product Description 9
Installation 13
Connecting other devices 16
Setup Wizard 22
Usage 24
FUNC Menu 24
Menu structure 24
Monitoring 26
Remote monitoring & control 31
Playback, Search and Copy 33
Playback 33
Screen composition/names of the functions 34
Copy 36
Configuration 37
System configuration 37
Disk 38
Network 46
Devie Settings 51
Event Configuration 57
Recording Set Up 62
Web Viewer 65
System requirement 65
Installation 65
login 65
User set up 65
Monitor 66
Playback 69
JAVA Viewer 72
3
System requirement 72
Installation 72
Login 72
Monitor 73
Playback 74
Webeye 75
Mobileviewer 75
Appendix 76
Problem solving [FAQ] 76
Compatible HDD 78
Factory default set-up values * 78
Product specification 82
Product Dimension 85
4
Key Features
Hybrid
Various video format of HDSDI (1080P/720P), 960H, NTSC/PAL*,
EX-SDI (DoubleReach) cameras can be displayed simultaneously.
It supports real-time live monitoring and record/playback on
various format and it records from 5 seconds before event and
record up to 30fps per channel.
 Various video record
- HDSDI (1080P/720P) camera
- EX-SDI (Double Reach) camera
- SD 960H camera
- SD (NTSC/PAL) camera
 Supports Normal/Event Record, Schedule/Event Record, Emergency Record
 Supports archiving event list(sensor, video loss, motion detection, Text, Fire detection)
 Max 5 seconds pre-alarm recording per each channel
SD : D1
HD : 720p
Full HD : 1080p
FULL HD
FULL HD high quality video shows far superior resolution than SD video product. Over 1200 TV lines at 1080p
resolution can be visible.
1080P Resolution
Full HD
SD
720P Resolution
D1 Resolution
HD-SDI
It is product using HD-SDI technology transmitting HD quality images through coaxial cable.
Supporting resolution is as follows
 Transmission method – SMPTE 292M : HD-SDI
 Resolution – 1920x1080p 25/30Hz, 1280x720p 50/60Hz
EX-SDI (Enhances transmission distance by Max. 400m)
EX-SDI transmission method is upgraded transmission method improving HD-SDI transmission distance. It can
increase conventional HD-SDI transmission distance up to 400~500m without any repeater. (based on 5C-HFBT
cable, Please be noted that transmission distance could be various based on cable type and environmental
condition).
* Adopted differently based on product specification
5
Fire Detection
WEBGATE’s fire detection camera(C1080BL-AF-F2/C1080PBL-AF-F2) which is equipped with feature to detect
Fire can be connected to DVR and it will notify manager of fire alarm quickly thoughout DVR, CMS and mobile
phone.
SD 960H, NTSC/PAL
960H, NTSC/PAL cameras can be working with DVR.
Surveillance Screens
Every



channel will display HD streams without interruptions and will offer many different types of screens.
Various Surveillance Screen Mode - Single, Multi Screens (1,4,9,10,13,16,CustomA,B,C) *
Auto Screen Sequence, Event Pop-up
SPOT – Single, Multi screen division(1,4,9,16), Auto screen sequence *
Voice Recording *
Supports real time voice input and recordinig function.
 Real time 4ch voice input and recording function
 Input : 4ch RCA, Output : 1ch RCAI(Rear), 1ch HDMI(Rear)
 Audio recording and playback can be played Simultaneously
Search and Playback
Various useful functions for search & playback
 Simultaneous playback for every channel
 Playback by time, date, channel
 Time / Calendar / Event / Thumbnail / Bookmark search
 Forward / Backward search function of freeze frame
* Adopted differently based on product specification
6
Save and Backup
You can record video data into the internal HDD, and image can be copied to USB memory.
 Backup device : USB stick
 External storage device : e-SATA HDD or NS04R (exclusive storage device)
 Supports file system with up to max 128TB in case DVR and 8 x NS04R is connected in cascade
Network
Supports LAN, xDSL, and etc., and key functions can easily be controlled by web browser or customized CMS
program.






HD Live monitoring/playback/backup from the remote site
Multi-streaming feature for slow network environment (supports nHD monitoring)
Sending event info(image) using E-Mail/ FTP
Recorded video playback, save, search function, and DVR control function on PC via CMS
Supports 10/100/1000 Mbps Ethernet/xDSL
Managing up to 1024 DVRs with CMS
Others
 User friendly GUI and mouse
 Easy and simple firmware upgrade, and recorded video back up function using USB stick
 Using Ac the PC Playback function, replay the DVR’s HDD on a PC
(HDD set as RAID could not be played on the PC, even if HDD is connected to PC)
 Supports PTZ control and PRESET function
 Easy control of up to 255 DVR with a single remote control
Specification by Models
Models
CASE
HDD
EX-SDI
SD
Fire
detection
NS04R
Full
SATA*5 + eSATA
O
O
O
O
HSC1601F-D
Middle
SATA*2 + eSATA
O
O
O
O
HSC801F-D
Middle
SATA*2 + eSATA
O
O
O
O
HS1600F-D
(O : Supported / X : not-Supported)
7
Components
Please check the below to make sure you have every part.
HS1600F-D
DVR
Remote Control & Batteries
Mouse
SW & Manual CD
Quick guide
Remote Control & Batteries
Mouse
power cord
SW & Manual CD
Quick guide
adaptor
Rack bracket
screw
power cord
HSC1601F-D / HSC801F-D
DVR
Rack bracket
screw
* Adopted differently based on product specification
8
Product Description
HS1600F-D
Front view
function description
part name
1
2
3
Power
turns ON/OFF the power
PWR
It turns on when power is ON
REC
Shows record status while recording
EVENT
Turns on if event is triggered
NET
Shows network connection status and it flickers if network is connected
USB port
USB port for flash memory or mouse.
HS1600F-D
Rear view
part name
9
function description
1
Power Input
AC100V~AC240V power cord socket
2
Ground Connection
Connection terminals that connects DVR to an outside device
3
SPOT
Connection port for SPOT monitor
4
Audio Input/Output
Audio Input : Audio input connection terminal
Audio Output : Speaker output terminal
5
Sensor, Relay, Com2/3, RS-485 terminating Sensor : External sensor input terminal..
resisters
Relay : Relay connect terminal.
Com2/3 : For connection with RS-485 device.
Set terminating resisters when using RS-485 method.
6
COM1
RS-232C D-SUB
7
eSATA port
For connection with external eSATA HDD.
8
Channel Input
Camera input BNC port for 1080P, 720P, 960H, NTSC/PAL,
EX-SDI (DoubleReach) cameras
9
HDMI Output
HDMI monitor connection output port
part name
10
11
function description
Ethernet, Storage
Ethernet : network connecting terminal (RJ-45)
Storage : Exclusive network storage device(NS04R) is connected and used.
VGA Output
VGA monitor connection output port.
HSC1601F-D / HSC801F-D
Front view
function description
part name
1
2
3
Power
turns ON/OFF the power
PWR
It turns on when power is ON
REC
Shows record status while recording.
EVENT
Turns on if event is triggered
NET
Shows network connection status and it flickers if network is connected
USB port
USB port for flash memory or mouse.
HSC1601F-D
Rear view
part name
function description
1
Power Input
Connection socket for DC 12V power code
2
Ground Connection
Connection terminals that connects DVR to an outside device
3
SPOT
Connection port for SPOT monitor
4
Audio Input/Output
Audio Input : Audio input connection terminal
10
part name
function description
Audio Output : Speaker output terminal
5
Sensor,
Relay,
Com2/3,
terminating resisters
RS-485 Sensor : External sensor input terminal..
Relay : Relay connect terminal.
Com2/3 : For connection with RS-485 device.
Set terminating resisters when using RS-485 method.
6
COM1
RS-232C D-SUB
7
eSATA port
For connection with external eSATA HDD.
8
Channel Input
Camera input BNC port for 1080P, 720P, 960H, NTSC/PAL,
EX-SDI (DoubleReach) cameras
9
HDMI Output
HDMI monitor connection output port
10
Ethernet
Ethernet : network connecting terminal (RJ-45)
11
VGA Output
VGA monitor connection output port.
HSC801F-D
Rear view
part name
function description
1
Power Input
Connection socket for DC 12V power code
2
Ground Connection
Connection terminals that connects DVR to an outside device
3
SPOT
Connection port for SPOT monitor
4
Audio Input/Output
Audio Input : Audio input connection terminal
Audio Output : Speaker output terminal
5
Sensor,
Relay,
Com2/3,
terminating resisters
6
COM1
RS-232C D-SUB
7
eSATA port
For connection with external eSATA HDD.
8
Channel Input
Camera input BNC port for 1080P, 720P, 960H, NTSC/PAL,
EX-SDI (DoubleReach) cameras
RS-485 Sensor : External sensor input terminal..
Relay : Relay connect terminal.
Com2/3 : For connection with RS-485 device.
Set terminating resisters when using RS-485 method.
9
HDMI Output
HDMI monitor connection output port
10
Ethernet
Ethernet : network connecting terminal (RJ-45)
11
VGA Output
VGA monitor connection output port.
11
Remote control
Can use every function of the DVR and control
several DVRs with only one remote control. To
be able to use the remote control, please create
a user ID on the remote control ID section of
system settings. (See the right picture for
working angle of a remote control)
Remote control
12
Installation
Check settings
This DVR is high quality security device with a high capacity built-in HDD and important curcuits. Before
installation, please read carefully below recommendations as high internal temperature of the product can lead
to damages and shorten product life cycle.
Recommendations on installing a DVR in a rack.
1.
2.
3.
4.
Don’t seal the inside of rack where DVR is installed.
Keep airflow through inlet and outlet.
If there is another device installed in the rack, secure additional space or install air ventilation.
Installation of an air circulation fan around each inlet and outlet is strongly recommended.
(Install filter around inlet or outlet for harmful substances)
5. Keep ambient temperature between 5°C~45°C around DVR.
Warnings if HDD is installed
1. Please be extra careful not to damage HDD as it easily breaks.
2. During installation, make sure insulated coat doesn’t come off or isn’t placed in the worng place.
3. Don’t lose screws and parts.
(If screws an parts are not screwed or assembled correctly, product may not operate)
4. Check HDD compatibility list HDD
(Please check with CS team)
5. Partition table must be removed for HDDs used in PC or other DVR models before installation.
Adding HDD
Remove the power cord before installation to protect DVR against possible damage and an electric shock
Please call the store you purchased the product from if it isn’t operating correctly due to installation or
configuration mistakes.
Warnings regarding Data loss
Please handle with care so HDD data isn’t damaged.
Check HDD compatibility before installing additional HDD.
Be careful not to give any shock on HDD during operation which could lead to possible damage or malfunction
.
 Cases when HDD and its data can be damaged.
To minimize the data loss, please copy data as often as you can.
Physical shock during disassembly or installation may lead to Data damage.
Sudden power outage or turn off of DVR can damage HDD.
Please don’t try to move or shock DVR while HDD is working.

13
HDD installation
HS1600F-D
1. Unscrew bracket screws that are fixing it to a DVR..
2. Push HDD bracket to a direction shown in the right picture and
separate from fixtures.
3. Lift HDD bracket to a direction shown in the right picture and
separate from the bottom.
4. Place HDD in a HDD bracket and fasten 4 screws on each side.
14
5. Place HDD bracket fastened with screws in DVR and fasten it on
the bottom with screws.
<Note>
Below is SATA cable socket sequence of a mainbaord.
Up to 5 HDDs can be installed inside DVR.
Main Board
INT A
INT B
INT C
INT D
INT E
eSATA
Disk Manager
INT A
INT B
INT C
INT D
INT E
eSATA
HSC1601F-D / HSC801F-D
1. Install HDD and hold HDD using screw at the bottom of DVR.
<Note>
Arrange of SATA cable socket is as follows.
2ea of HDDs can be installed in DVR.
Main b’d socket
INT A
INT B
eSATA
15
Disk manager
INT A
INT B
eSATA
Connecting other devices
Basic connections
HDMI Monitor connection
1920X1080p resolution is suppoeted. Please check if monitor can support this resolution before connection.
 DVR output resolution : 1920 x 1080p
<Note>
We strongly recommend using HDMI certified cable when connecting to DVR.
VGA Monitor connection
800X600, 1024X768, 1280X1024, 1920X1080 resolution is suppoeted. Please check if monitor can support this
resolution before connection.

VGA output resolution change in the menu
[FUNC menu - tool – VGA resolution] click then select preferable resolution and reboot DVR.

VGA output resolution change by remote control
Press [FUNC-4-2-3-1-4-X-FUNC-MULTI] key in order to change VGA resolution.(based on X value)
X : 1 - 800x600
X : 2 - 1024x768
X : 3 - 1280x1024
X : 4 - 1920x1280
Connecting a Camera
Connect HD-SDI(1080P/720P), EX-SDI (1080P/720P), 960H, NTSC/PAL camera using recommended cable.
* Adopted differently based on product specification
Recommended cable *
Cable Type
5C2V
4C-FB(T), 4C-
HD-SDI transmission
distance *
about 90M
about 140M
EX-SDI transmission
distance *
about 150M
about 280M
Use
Analog signal
High-foamed cable, double or triple
16
HFB(T), RG59
5C-FB(T), 5C-HFB,
L-6CHD, RG6
5C-HFBT
about 180M
about 360M
about 200M
about 400M ~ 500M
shielded cables are recommended
HD-SDI cable
HD-SDI cable
* Depends on manufacturer and models.
<warnings>
 Transmission distance will be affected by cable types and installation site environment
 Transmission distance of the chosen cable will be various based on reduction rate of 750MHz (reduction
rate of dB/100m < 25dB is recommended)





Foamed or high-foamed trishield cable is recommended.
Impedance 75Ω must be used for coax cable connection and connector work.
Beware of deformation of cable due to high pressure over the cable.
Don’t pull the cable with too much force.
For DVR input/output, cables will be tied at the rear of the rack. If tied too tightly, inside/outside insulator can be
deformed so tie it loosely within cable’s curvature range.
Connecting a power cord
When power cord is connected, DVR starts booting automatically.
How to turn off DVR while it is operating : press power switch for 5 seconds, and a pop-up window will
appear, then select “YES” to turn off the power. For turn back on the power again, push the Power button.
Connecting an audio
RCA cable to connect audio input/output devices to DVR
Connecting external device
Connecting USB Device
USB port can be used for copy of recorded data and for mouse.
See below table for USB Device specifications.
USB specifications
Usable device
Voltage specifications
Ver 2.0 or later
USB Stick
DC 5V / Max. 200mA
<Note>
USB stick needs to be FAT32 formatted.
DVR may not recognize USB Flash memories that require additional program on MS Windows.
Connecting eSATA Device
If external eSATA storage is used, it can be connected to a rear eSATA port. Additional power for eSATA device
will be required as DVR doesn’t supply power.
.
<Note>
1.
2.
17
Check compatibility of eSATA with DVR as not all eSATA are compatible with DVR.
If eSATA is connected to DVR when it is on, it may not be recognized depending on external devices. So
we recommend following the below steps.
1) Turn off DVR.
2) Turn off eSATA then connect it to DVR.
3) Turn on eSATA.
4) Turn on DVR.
Connecting input/out terminals
Wire end handling
See below for wire end handling used in terminal block.
have different thicknesses.
Please work on single line and multiple line as they
- Multiple lines : Peel off the recommended length(8~10mm) and lead-coat it. Use AWG 22 ~ 26.
- Single line : Peel off the recommended length(8~10mm) and use AWG 20 ~ 26.
Wire insertion/removal
As shown in the picture, push the lever to insert or remove a
wire.
Connecting the sensor
specification
below requirements need to be met in order to connect the sensor
Input Channel #
16EA Transistor input
Input Type
N.C, N.O support
Specifications
Supported sensor
Dry contact sensor
Connection method
Connect the trimmed wire to terminal block
Available input
Minimum 500ms
pulse range
Performance
Output current
Standard DC 12mA
* Adopted differently based on product specification
Connecting sensor input terminal
Please see the picture for sensor input. The below picture is an example of connecting Dry Contact sensor type.
Please refer to “Wire Handling” for more information.
Connecting relay
specifications
Please see the below table for alarm output requirements.
Output Ch. *
4ch relay output
Specifications Output type
Dry Contact
Connection
Connect the trimmed wire to terminal block
18
Performance
method
DC
AC
30V / 1A
125V / 0.5A
* Varies between different models
Connecting relay
Please refer to the below picture in regards to connecting R1~R4 output. Below picture is an example of
connecting a light bar. Please see “wire end handling” in regards to connecting/removing wires.
Connecting COM1 serial port with external devices
Connecting Text input device (ATM / POS / Access Control)
Using COM1/RS232, TEXT DATA can be recorded with synchronizing POS/ATM.
As shown in the picture, for a set up to connect COM1/RS232 (D-Sub 9pin), set up serial & text info under
“device” menu.
Connecting COM2/COM3 serial port external device
Connecting serial communication terminal for PTZ device & Keyboard device
Control PTZ devices and Keyboard devices by connecting
them to DVR’s COM ports. Picture in the right shows how
a camera and a keyboard device with PTZ function are
connected to RS-232 COM1 & RS-485 COM2 respectively.
Other serial communication terminals will be connected
to other devices as shown in the below picture.
To connect or remove a wire, please refer to the “wire
end handling” and supported models can be checked on
“compatible PTZ & Keyboard device” on the supplement
booklet.
19
Connecting Serial Port for Transparent device
Text Device
Keyboard Device
COM1
RXD
TXD
GND
Keyboard Device
Dome Camera
PTZ Receiver
COM2
TR+
TRGND
TX
RX
GND
TR+
TRGND
Connecting PTZ & Keybaord
up to 255 DVRs can be connected using keyboard and PTZ control is possible for all
channels connected to DVR. Also, multiple keyboards extension as Slave can be used limitless with
Master Keyboard. In ths case, Master Keyboard has priority for all controls. Please refer the instruction manual
for PTZ keyboard connection & its way of control which comes with PTZ/ Keyboard.
Configuration using 2 serial ports
PTZ(DOME) and Keyboard can be connected to DVR’s 2 serial ports. In such case, keyboard can control DVR
and PTZ(DOME) at the same time, and DVR can control PTZ(DOME.
The below diagram represents configuration of multi DVRs with PTZ(DOME). To control PTZ(DOME) using
keyboard, please select DVR ID then select camera for control.
control device
connection device
Keyboard (Master/Slave)
All DVRs can be controlled, all PTZ(DOME) can be controlled
DVR
PTZ(DOME) directly connected to DVR can be controlled
Serial Cable
Video Cable
COM2
COM3
DOME 1 DOME 2
DOME 16
DOME 1 DOME 2
DOME 16
DOME 1 DOME 2
DOME 16
DOME 1 DOME 2
DOME 16
DVR 1
DVR 2
Master
DVR 3
DVR 255
Slave 1
Slave 2
Slave 255
20
Confituration using 1 serial ports
When using 1 serial port, user can connect both of PTZ(DOME) and Keyboard to a port, and user can select a
PTZ(DOME) through the keyboard. According to DVR’s COM port setting, connected controllable device can be
selected, and by choosing a DVR ID, keyboard can control several DVRs.
In case PTZ(DOME) is setup on DVR COM port, user can use it as follows.
Control device
Connection device
Keyboard (Master/Slave)
All DVRs can’t be controlled/ All PTZ(DOME) can be controlled
DVR
Only PTZ(DOME) directly connected to DVR can be controlled
In case Keyboard is setup on DVR COM port user can use it as follows
Control device
Connection device
Keyboard (Master/Slave)
All DVRs can be controlled, All PTZ(DOME) can be controlled
DVR
All PTZ(DOME) can’t be controlled
Serial Cable
Video Cable
COM2 or COM3
DOME 1 DOME 2
DOME 16
DOME 17 DOME 18
DOME 32
DOME 33 DOME 34
DOME 48
DOME 240 DOME 241
DOME 255
DVR 1
DVR 2
Master
DVR 3
DVR 255
Slave 1
21
Slave 2
Slave 255
Setup Wizard
Setup Wizard can help user setup “language, network, DDNS, time, harddisk, record mode” with ease.
It runs automatically when DVR boots initially. User can run Setup Wizard on “Menu > System > Tool > Setup
Wizard”.
Start
Select language and choose whether to use Setup Wizard or not.
Network
Set up IP address of DVR or skip network setup.
Press “Test” button to check if there’s problem in network
communication or not.
1) Network normal - “Communication with Gateway is successful.”
2) Network abnormal - “Communication with Gateway is failed.”
DDNS
Setup DDNS of DVR or skip DDNS setup.
Enter domain name to use then press “domain change” to create
domain name.
Connection method after Domain “test” created
1) Browser - Enter http://test.mycam.to in address bar
2) Bobile app(webeye) – test.mycam.to
3) Exclusive software Control Center – test.mycam.to
Domain change message
1) Domain change normal – Success
2) Domain change fail – Domain can not be used
22
Time and time zone
Setup time, standard time zone and daylight saving time(DST).
Network(NTP) autotime synchronizing
1) In case DVR is connected to internet – In use
2) In case DVR is not connected to internet – Not in use
Daylight saving time(DST, summer time)
1) DST saving time is used – In use
2) DST saving time is not used – Not in use
Hard Disk
Connected hard disk is searched automatically and shown as
inventory.
Select hard disk to use and run “Enable and format” to format and
enable(start record) selected hard disk.
Enable (Start record)
1) Hard disk starting record – Yes
2) Hard disk connected to DVR but not starting record – No
Record mode
There are 3 type of record modes.
1) Normal image 1fps, Motion image 15fps (recommended)
- If there’s no movement 1 frame per second, if there’s movement,
15 frames per second will be recorded.
2) Record 15fps only moving image
- It doesn’t record anything, If there’s no movement, while it record
15 frames per second if there is movement.
3) Always record 30fps
- All channels, always record 30fps.
23
Usage
FUNC Menu
All DVR functions can be controlled by using Mouse.
To open FUNC menu, click the mouse’s right button at live
or playback screen.
FUNC menu at Live screen
 Search - Recording data Search/Playback
 Copy – Copy recorded data
 Tools - PTZ, Instant PTZ, Camera Setup, Multi, SEQ,
Set Custom, SPOT, VGA Resolution, Digital Zoom,
Freeze, Snapshot, Manual Relay, Emergency
Recording, Event Buzzer off, Bookmark
 Information – Screen, Video, Recording, Disk,
System, System Alarm
 System - Menu, Lock, Logout, Power off, Reboot
[Live]
[Playback/Search]
FUNC menu at Search/Playback
 Live – Tun into live screen
 Copy – Copy recorded data
 Full Screen – Turn into full sized screen
 Thumbnail – Run thumbnail search
 Tools – Digital Zoom, Snapshot, Multi screen,
Bookmark
 Information – Screen configuration
Menu structure
Please refer to menu structure below.
24
Menu Structure
Press [MENU] key on front panel or click [Main
Menu] button under FUNC menu to enter the
setup menu. To exit menu, press “X”.
Main Menu
Main menu
The selected tab is shown in bright color
and the sub-menu box will show the chosen
Sub menu
Sub-menu
Selected sub-menu will disply the chosen item
and the related setting will be shown. To move
to the upper main menu, click the [Save
Changes] at the bottom of menu, or press “X”
button.
Set-up dialogue box
The selected tab is shown as orange, and To move to the previous/next tab.
Dialogue box for string input
Dialogue box for string input is shown as follows. User can enter
words or numbers using a mouse or direction buttons.
Mouse to enter it. To delete the entered letter, press [] button, and
to enter a space, press [SPACE] button. To exit the dialogue, press
[ENTER] button to save string and exit or press [CANCEL] button to
cancel the string.
25
Dialogue set
up box
Monitoring
Basic screen
The basic screen will be maximum multi screen DVR supports and if rebooted after multi-screen mode has
been modified, previous multi-screen mode will be shown. (DVR default account admin / 12345)
Single screen
click the channel number you want to view or Double
click the left mouse button.
Click [MULTI] button or Double click the left mouse
button again to o return to multi-screen
.
Multi screen
Click [MULTI] for multi-screen display to choose multiscreen mode.
Screen description
Status bar represents status of DVR.
Status bar shows current date/time, emergency record, record, motion detection, fire, sensor, text, disk capacity,
status bar auto hide.
Auto switch mode(Sequence)
Auto switch screen mode is a feature in which the selected channel or multi screen division switches in sequence
with the time interval of 1 – 60 seconds.
(Please refer to “Monitor setup” for further configuration method).
Auto Switch mode can be set in every division mode by pressing the [SEQ] button.
Press [SEQ] button once more to leave from Auto Switch mode..
26
Check video
When turned on, DVR starts booting automatically and shows screen after the booting.
<reference>
Auto login “ON” : means login set without any login dialogue box (default - auto login ON, admin)
Auto Login “OFF” : means there will be dialogue box requiring password.
Event screen
It is available to set the selected screen pop-up automatically when an event is triggered
Users can choose events for pop-up from event source. Event source supports Sensor, Motion Detection, No
video, Text, System event and so on.
If multiple events are triggered, the corresponding screens will pop up automatically.
For example, if events are triggered in 3 Channels, they will be displayed in 4 screen division automatically. To
return to the original channel, press the button of one of the poped up channels.
Press [ESC] to return to original channel.
<warning>
1. Set image popup “enable” then select even source(sensor, motion detection, no video, text).
2. To use fire detection feature needs WEBGATE’s fire detection camera (C1080BL-AF-F2/C1080PBL-AF-F2), and select
sensor of fire detection camera channel as “Flame Detector”.
If Alarm pop-up is “Off”, Event pop-up will not be enabled.
If event screen switch is set “Keep”, it keeps showing pop-up image until users press a button. To return to the previous
screen, please press any button.
Enlarged screen
Using D-Zoom on a single screen, users can enlarge the section they want to view..
Click on [Zoom] button or icon
in single / full screen or [FUNC]
button then select Zoom button to activate Zoom mode.
To expand or reduce, please use +, - button or use mouse wheel
drag.
Enlarge mode can be used between 1.00X ~ 10.00X range.
“
” To return to the previous screen, select a button and press
the enter or left click the mouse..
<Note>
Live/playback in multi channel mode doesn’t support zoom. To use
zoom, please make live and playback screen into single mode.
27
Pausing the live screen
Just like in playback, Live screen can be paused.
Click on [Freeze] button while live monitoring to pause image and to return to live again, please click on any
button.
Snapshot picture
Please click on Snapshot while image is Freeze in single live monitoring. Copy them to USB too.
Click FUNC menu -> Tool -> Snapshot to copy image to USB memory without stopping or pausing image.
PTZ control
Connect PTZ camera to DVR and set relevant protocol on “PTZ” under MENU, and users can operate PTZ while
monitoring live images.
Instant PTZ
If Instant PTZ in Tool menu is set activated, PTZ mode will be on
automatically upon single channel, which PTZ function is set.
+ mark in the center of image will be on while PTZ function is
working.
PTZ
When PTZ is on, through PTZ button on front or PTZ buttons under
FUNC menu, users can use pan/tilt, zoom, focus, aux and preset
functions.
Focus
Click “near”, “far” buttons to focus.
zoom
click “In”, “Out” buttons to create a preferred focal point.
pan/tilt
pan/tilt function for PTZ configuration channel
Use “Up”, “Down”, “Left”, “Right” to control pan/tilt.
Loading preset
Used to move to set preset location.
Select wanted Preset number and press [Load] button.
28
Saving preset
Use to save new preset location.
Use focus/zoom/pan/tilt to move to a location you want to save it and select a preset number and press [save]
button.
Auxiliary On
Use direction keys or mouse wheel to select aux number.(up to 16 Aux functions can be used). Select “on” and
press enter or click a mouse)
Auxiliary Off
Use direction keys or mouse wheel to select aux number Aux
Select “on” and press enter or click a mouse.
Camera Setup
This menu is used to enter the menu of connected PTZ device. Please
control PTZ device menu using up, down, left, right.
Bookmark
Add / Edit bookmark No, Time, Channel and Memo in [Tool-Bookmark]
of FUNC menu while live or playback.
Run bookmark icon “
“in Search, Copy, Thumbnail to load saved
bookmarks.
Screen Information
Setup or change display information such as channel expression, color,
size, status, show/hide/auto hide in [Information-Display] of FUNC
menu.
29
SPOT
Run [Tool-SPOT] in live to select channel to be on SPOT screen or Auto
sequence.
30
Remote monitoring & control
Users can connect DVRs, control and monitor it remotely by using Control Center (WEBGATE’s CMS program)
Installation of Control Center
Execute “Control Center Setup vx.x.x.exe” to install the Control Center.
Start of Control Center
After installation is completed, click “Control Center Monitor” icon and execute it.
(ID : admin / Password : admin)
Screen configuration of Control Center
Item
1
Menu/Toolbar
This is menu and function button used in program
2
Unit list window
This indicates unit/viewset/map registered in program. User can click on the list to show image
3
Image window
This indicates live monitoring image
4
Status & Action
This indicates status of unit, event information and alarm log
window
31
Description
Add Unit
Click [Add] icon
on the toolbar or execute [Add
Unit] by clicking mouse right button at “My Units”.
1) Select “URL/IP Adress”
2) Enter proper IP address and Port, then click [Find]
button. If the DVR is located inside local network,
you can easily find the DVR by clicking [Auto
Detect] button.
3) Check whether the unit’s information is properly
displayed.
4) Enter DVR’s ID and pasword, then click [OK].
5) DVR will be listed on the unit list of “My Units”.
(DVR’ Default ID/Password is admin/12345)
DVR’s Live display
If you click a unit’s icon in the “My Units”, you can get live monitoring display. Split-screen will be displayed to
show all channels of the unit.
1
2
All channel display at the same time
① If you click a unit’s icon, all channels' video will be displayed on the split-screen.
Display a specific one channel
① If you drag a camera icon and drop it to one of split-screen, video from the camera will be displayed on the
screen.
32
Playback, Search and Copy
Playback
Playback with Basic Screen





In monitoring mode, Remote control Press [◀/▶] button to playback the recorded video in full screen
If [PLAY] button is pressed, the last playback will run at 1x speed.
If [FWD] button is pressed, playback starts from 1min earlier than recent time at 1x speed.
If [REW] button is pressed, reverse playback starts from 30 second earlier than recent time at 1x speed.
If [PLAY] button is pressed in multi screen mode, playback will start in multi screen mode.
Playback function
button
◀▶
function
playback
ll
▶▶
pause
High-speed
forward
playback
Step forward
playback
l▶
◀◀
◀l
33
High-speed
reverse
playback
Step reverse
playback
function description
Playback 1× speed. When using mouse, click search button under Function
menu. If [◀▶]button is pressed in monitor mode, DVR replays from the last
replayed position. Pressing [◀▶] button during playback makes reverse replay.
Pauses the playback
Different playback speed
(in the order of x1, x2, x4, x8, x16, x32, x64, x1, x2, x4)
During playback, Press l▶ while pressing ll to step forward the playback. To
return to normal playback mode, press [◀▶]
Different reverse playback speed
(in the order of x1, x2, x4, x8, x16, x32, x64, x1, x2, x4)
During playback, press ◀l while pressing ll to step reverse the playback.
return to normal reverse playback mode, press [▶].
To
Screen composition/names of the functions
Screen composition
name
function description
1
Playback button
Use buttons to control the playback.
2
screen
Displays the playback videos.
log viewer
Displays the log seen on timeline
Calendar/time
Select a date on the calendar to view the data of the date.
3
search
4
timeline
Displays the info of the unit and search the playback sections.
Icon function description
buttons
description
Use to move to live mode.
Use to COPY
Used for multi-screen mode.
Use for Thumbnail search.
Use for control or manage of playback function.
34
Time search
If the user enter a date and time and click
time moves to that time.
, DVR’s playback
Calendar search
When calendar search is run, it marks the dates on which there were
recordings.
Select a date from calendar you want to search, and it moves to
that date.
Event search
Event information on timeline(All, Motion, Sensor, Text, None) will
be shown on log viewer. If the user select one of the list, DVR’s
playback time moves to the event time.
Timeline search
If the user clicks a position on the timeline, DVR’s playback time
moves to that time.
Thumbnail Search
Thumbnail search will show 35 different thumbnail image on
detected images by time interval or motion. Click on selected image
for playback or copy.
• Time interval : 35ea thumbnail images are displayed by searching
image between entered start and end time.
• Motion detection : 35ea thumbnail images are displayed by
searching image on the motion between entered start and end
time.
35
Copy
This is for copying recorded videos. There are 2 types of copying, EXE, and AVI.
Only authorized users by security settings can use the Copy function. For more about authority settings, please
refer to (user setup) section.
To run copy function, press [COPY] on the Remote control or Click Copy button under Function menu.
If a user runs copy menu during playback, playback time will be set as backup start time.
EXE
Use USB stick to back up and use mini player or control center to
playback. It is possible to select a part of channels depending on the
choice of the channel list made by a user.
Name
function description
type
Select EXE using direction keys or mouse wheel.
channel
Press enter on a channel or right click a mouse to select a channel. (Select All :
select all channels / Reset : cancel the selection of all channels)
Format a USB stick before copying. Press Format or right click a mouse to begin.
(supports FAT32/NTFS)
format
<Warning>
If backup isn’t 100% complete, then normal playback on PC isn’t possible.
AVI
Users can backup via USB memory. The specific part of channel can
be copied but it is impossible to copy multi channels at the same
time. There is no specific player required but users can playback files
using common media player.
<Caution>
If copied file doesn’t play back, please, install integrated codec first.
36
Configuration
System configuration
Please set time/disk/authority.
Date/time
menu  system  date/time
Before recording setting, DVR has proper time information.
DVR has ‘UTC +09:00 Seoul’ as default time zone.
<Note>
1. To search DVR’s recording data properly, DVR should have exact time
zone information. If DVR has wrong time zone information, user may get
wrong recording data during Search, copy, etc.
2. Please note that if user changes DVR’s time information, recording
data’s time stamps in hard disks will be changed at the same time. DVR’s
system log has record for DVR’s time change.
Time settings
<note>
Under recording, if a user changes time when it is already recording(saved in HDD), it will change the time of the
previously recorded videos. Moreover, there will be a history of a time change on the system log.
Standard time zone
Set the timezone to the location a product is used in
daylight saving (DST)
This menu is synchronized with time zone configuration menu. It means only when daylight saving area is on,
this function works. Daylight saving applicable area is the same as with Microsoft Windows time zone. Users can
select whether to apply daylight savings or not when DVR is installed in Daylight saving applied zone
Date format
Date display settings.
Select one of “yy/mm/dd”, “mm/dd/yy”, “dd/mm/yy.
Save changes
To apply the canges made for date/time, click “date/time apply” button.
<warning>
Other configurations except date/time save automatically, but “date/time”
configuration doesn’t save automatically since it can critically affect HDD recording file system.
To apply the changed value, user must click [date/time apply] button
37
NTP
menu  system  date/time  Network Time Protocal(NTP)
NTP (Network Time Protocol) synchronizes the time of all connected
device. To set DVR time to standard time open server which offers
standard time on the network and client which is connected to
open server to receive time and synchronize it with standard time.
Besides that DVR can be set as server to offer standard time to
other devices and can be set as both server and client as well.
NTP server location
Enabled when NTP mode is set as client/server. Select if NTP server
is public or local.
NTP local server IP
Enabled when NTP server is set as local and sets server IP address.
Enter NTP server IP address located in local network or DVR IP
address with NTP mode as a server.
NTP mode
Set DVR NTP mode to client, server or both.
Name
client
server
both
function description
Receives standard time from external or internal server and enable Time
synchronization of DVR
Make DVR a NTP server and provide standard time to other DVR or devices.
use both client and server at the same time
Interval
Configure interval of time sync.
Disk
menu  system  disk
Internal, External HDD can be added, deleted or formatted.
Overwrite (Auto Deletion)
Image is recorded overwrittiing from the beginning of HDD when
HDD is full.
Stop Recording
Record stops when HDD is full.
Block Playback
This function allows only recordings of pre-assigned date to be
viewed.
For example, after 10 days of recording(picture 1), if playback block
is set at 2 days(picture 2), then as shown
in the picture, only the last 2 days of the recordings can be played
back.
38
Recorded part for 2 days.
Record during 10 days.
Start record
In progress of record
Record during 10 days.
Start record
[Picture 1]
In progress of record
[Picture 2]
Data deletion
This function allows only recordings of preassigned date to be viewed.
For example, if playback block is set at 3 days, then DVR will only save data for 3 days and will
delete data more than 3 days old even if auto-deletion isn’t on.
Once deleted, it can’t be restored so please be extra careful.
NS04R Group
Image can be recorded on NS04R located in same network(local network) of DVR.
(1) Enable NS04R group in DVR [menu – system – disk] then
select to-be used group. (ex group ID : 90).
(2) Select group of NS04R same as that of DVR’s using first
rotary switch located in rear of NS04R. (ex rotary switch 91).
(3) Select group of NS04R same as that of DVR’s using second
rotary switch located in rear of NS04R. (ex rotary switch 92).
(4) Connect DVR and NS04R with hub supporting gigabit using
Gigabit Ethernet Cable.
(5) Run disk manager of DVR [menu – system – disk] then
select NS04R to enable HDD of NS04R.
<Note>
1) Network cable used for connection with DVR must be Gigabit Ethernet Cable (Category-6).
Otherwise read/write performance are declined so in case of data usage is full, some images could
not be recorded properly.
1) Hub must be Gigabit HUB.
2) The max data size from single unit of NS04R is Writing 100Mbps, Reading 100Mbps. Please discuss
with network manager before connection over network.
3) It could take around 1 min till NS04R and DVR are connected after power on.
4) DVR supports connection with NS04R having same group ID with DVR.
5) 4 x front LEDs will be ON in order then all 4 x LEDs are ON(or OFF, blinking) at the sametime. After
that HDD’s list of NS04R can be verified in DVR Disk Manager.
6) NS04R connection to DVR using single port requires DVR’s firmware over v7.8, NS04R over v2.0. This
feature is not supported under DVR’s firmware v7.8, NS04R v2.0.
NS04R connection via single port feature could be various based on DVR model so please contact
manufacturer’s technical center or local dealer for more inquiries.
Recommended network configuration
(1) In case of NS04R is being used, we recommend customized hub(or switch) used only for DVR and NS04R’s
39
connection. Hith bandwidth is required for communication between DVR and NS04R so to secure stable
operation it will be good to separate connection from normal network.
(2) In case of multi NS04Rs connection to single DVR, rest of NS04R is recommended to be connected in
Cascade method to NS04R initially connected to DVR.
(3)
Ethernet Hub
DVR
NS04R
NS04R
PC or Network
NS04R
Ethernet Hub
DVR
NS04R
DVR
NS04R
PC or Network
NS04R
Ethernet Hub
DVR
NS04R
NS04R
NS04R
PC or Network
Disk manager
menu  system  disk  disk manager
This is menu for the management of internal or external HDD.
It manages HDD status, bad block, capacity, and whether to use
HDD or not.
name
type
Function description
Displays the location and types of a disk.
Int A (internal A HDD), Int B (internal B HDD), eSATA (external HDD), USB
40
model
Displays HDD model.
BAD block
Highlights the HDD with BAD block. 0 is shown when there is none. For HDDs not in use,
no bad block is displayed.
HDD size will be in MB.
Displays if HDD can be used or not.
- Good : normal
- Bad : abnormal (HDD needs to be replace.)
Displays if HDD is in use or not.
size
S.M.A.R.T
Enable
Yes : can be used / No : can’t be used
Enable YES
- select HDD in HDD NO mode and click [enable] button.
- A HDD which is used for DVR does not need additional format. New HDD should be formatted by DVR.
Enable NO
- select HDD in HDD YES mode and click [disable] button.
FORMAT
- can only run when enabled and click [format] after selecting HDD that needs to be formatted.
User settings
menu  system  user settings
DVR users will either be manager or user. Managers can use all
functions of DVR without limitation and can set up user settings. Up
to 10 users can be registered and each user can only use functions
for which they’ve been given access to.
Channel Rights
A manager has an access to every channel.
A manager can give access to channels to each user.
Function access
“Admin” has the rights to all the functions.
The action rights to each function(Playback/Search, Menu, Copy, PTZ,
Camera setup, Manual Relay, Power off, Network MIC) can be given
by each user.
ID & password change
41
For User 1~10, max 20 and 8 characters are allowed for ID and
Password.
<reference>
Default manager Password is “12345” and for user 1 ~ 10, password will take
a pattern of “11111” for user 1, “22222” for user 2 and so on. So user 10
will have a password of “00000”. To enter 0, press “10” on the front panel.
Additional User Setup
• Auto Login On: Select a user that can be automatically logged in
when booting.
• Auto Login Off: Login popup will show up when beeting. Video can
be monitored after login.
• Auto Logout On: If there is no control of DVR during the selected
interval, DVR will be automatically logged out.
• Auto Logout Off: Auto Logout will not work
• Auto Lock On : Auto lock features is on if there’s no operation
during time set by user
• Auto Lock Off : It doesn’t use Auto lock feature
Utility
menu  system  utility
Utility sets up DVR name, remote control ID, and language.
DVR alias
Set the DVR alias when connected to network.
language
select a language for a system.
Key buzzer
Button sound from front panel or remote can be turned on or off.
DVR keyboard ID
This menu sets the address of keyboard when using all functions of
DVR by keyboard. default value is “1”. If user wants to control various
DVR by one keyboard, its address should have different value. If
designated address is configured the same as keyboard, user can
control DVR function.
Remote control ID
When operating more than 1 DVR, it is possible to manage many DVR with one remote control by giving
different ID to each and every DVR. A remote control can have maxium of 255 IDs and if users want to use
every ID, then select ALL.
Select and control DVRs that have different ID with one remote control.
Selecting remot control ID
1) Point a remote control at DVR and press ID on the remote control.
2) Press ID on the remote control shown on the screen of DVR.
3) Press again ID on the remote control to complete the selection.
Ex) How to control a DVR(ID 1) by remote controller
Point the remote controller toward DVR > press ID button > Press 1 button > Press ID button again.
42
System Information
It shows DVR system’s information.
System information includes model name, firmware version, hardware
version, serial number, MAC address, camera type, HDD capacity,
remaining HDD capacity.
System log
System log shows the log list of system booting, user login, setting
changes. User can scroll the list using up and down buttons on the
front panel.
Recording status
Displays DVR recording status.
Firmware upgrade
Can update firmware by USB Memory stick
Steps for USB upgrade
1) Put firmware file into USB memory and insert it into DVR
2) Select “Firmware update” button
3) Select “Yes” to the popup “Upgrade firmware from USB disk?”
4) DVR will reboot automatically.
5) Firmware upgrade completed
<Note>
Firmware upgrade window runs automatically if higher version of
firmware than that in use are recognized from USB memory.
43
Video Status
It shows status of record per channels of DVR.
Factory reset
Change all set up values to default values.
Only a manager can use this function.
<Note>
Only a DVR system manager can use this function.
Refer to the (supplement – factor default value) for the factory reset.
Configuration Import/Export
Export – Saves Configuration data in DVR to USB
Import – Apply exported Configuration data to relevant DVR or another
DVR.
44
NTSC/PAL
Setup NTSC/PAL mode of the DVR.
• NTSC-DVR is running on NTSC(60/30Hz) fixed mode
• FAL-DVR is running on PAL(50/25Hz) fixed mode
• Auto-DVR can recognize input format of camera Then DVR is set
NTSC or PAL mode automatically
Setup Wizard
Setup wizard runs automatically on DVR’s initial boots up. It can be run
through “Menu > System > Tool > Setup Wizard”.
45
Network
Configure network info when DVR is connected to a network.
Network settings
menu  network  network  Ethernet
Select DVR’s network type between Ethernet or XDSL.
Ethernet
Select ‘Ethernet’ when the DVR is connected with dedicated line,
cable modem or LAN environment.
xDSL
Select ‘xDSL’ when the DVR is connected with xDSL line which uses
PPPoE. But, if the xDSL is not using PPPoE, it should be selected
as ‘Ethernet’.
Automatic Addressing (DHCP)
1) Off : If DVR’s network does not have DHCP server, please select
‘Off’. User should manually enter a specific IP address which is
given by network administrator.
2) On : If DVR’s network has DHCP server, user can select ‘On’. If
DHCP is enabled, DHCP server will assign DVR’s IP address
automatically .
IP Address
IP address is used for the communication between DVR and Control Center, and it is used for Webviewer to
connect DVR. Also Netmask, Gateway addresses given fromt the network administrator should be properly
configured. (When DHCP is enabled, this item will be disabled)
Net Mask
Net Mask defines the communication range of IP address. This information should be given from the network
administrator. (When DHCP is enabled, this item will be disabled)
Gateway
DVR should have proper Gateway address to communicate with external network. This information should be
given from the network administrator. (When DHCP is enabled, this item will be disabled)
DNS
DVR should have proper DNS address to use various network services such as WRS, NTP, e-mail and so on.
Please ask this information to network administrator.
UPnP Port Forwarding
When using Internet Sharing device supporting UPnP, this function eable all connected DVR to do Port
forwarding and they can be connected to Internet with IP address of Internet Sharing device.
(1) Configure two DVRs with DHCP On.
(2) Please, check if DVRs which are connected to Internet Sharing Device are allocated with official IP.
(3) Configure DVR port of DVR(A) and DVR(B) as 81 and 82 individually.
(4) Configure UPnP function of Internet Sharing Device as “ON”.
(5) Configure UPnP Port Forwarding function of DVR as “ON”.
(6) Please, check if Port Forwarding Status message is changed from “Not Available” to “Port Mapping is
OK”.
(7) Finally, if user accesses DVR(A) with the IP address with port number 81 or DVR(B) with the IP address
with port number 82, user can access DVRs.
46
Port
Register port # in DVR and use it to connect to control center or webviewer.
<Notice>
Default port is 80 and be careful in entering the port # when used with PPPoE modem and router. To use port
forwarding & UPnP port forwarding, network port change (e.g. 8000) might be necessary. Please ask this
information to network administrator.
Bandwidth limitation.
Bandwidth is to configure the maximum transmission speed. Its default value is unlimited and users don’t have
to set bandwidth value if there is no need to limit the network data size of DVR.
<warning>
Please consult DVR manager if you want to modify bandwidth value.
RTSP
It is short for Real Time streaming Protocol) and streams real time live
image of DVR
Authentification On: Only authorized users can view RTSP video.
Authentification Off: Non-authorized users can view RTSP video.
Stream1 : Original resolution
Stream2 : Lower resolution
In order to view channel 1 of DVR (Ex: 192.168.1.10) input
“rtsp://192.168.1.10/ch1/stream1”.
<Notice>
Use VLC player to view RTSP video on PC
IP filtering
Maximum 10 ranges of IP addresses can be set to allow or deny
remote network connection
Allow
Allow 192.168.0.0 ~ 192.168.0.255 > another IP addres that does not in
the range will not be allowed for remote network connection
Deny
Deny 192.168.0.0 ~ 192.168.0.255 > another IP address that does not
in the range will be allowed for remote network connection.
<Notice>
IP filtering limits remote connections to DVR Please be aware of what you are
doing before you change this page
47
P2P *
Input UID of P2P connection information in Webeye (Android or iphone) or scan QR code. Remote network connection can be made
easily without further configuration.
DDNS
*
Adopted differently based on product specification
Menu  Network  DDNS
DDNS setting at a DVR
User can give a domain name to a DVR by using WEBGATE’s DDNS
service, WNS(Webgate Naming Service).
DDNS setting at a DVR
1. Change DVR’s port which is not in use (e.g. 8000)
2. Configure router’s port forwarding setting. (i.e. port 8000 should be
connected to DVR)
3. Activate DDNS(WNS) at DVR menu
4. Enter domain to use and run “domain change” (Ex: test)
5. If the entered domain name is available, DVR shows “Success”. If the
domain name is occupied by another user, DVR shows “Unavailable
domain”.
6. If you can connect a DVR by using assigned domain name, it means
DDNS setting is properly completed.
(e.g. http://test.mycam.to:8000)
DDNS setting at a PC
1. Change DVR’s port which is not in use (e.g. 8000)
2. Configure router’s port forwarding setting. (i.e. port 8000 should be
connected to DVR)
3. Activate DDNS(WNS) at DVR menu
4. Enter http://www.mycam.to into browser and connect to WEBGATE’s
DDNS site.
5. Login by using WEBGATE DDNS account
(If you do not have WEBGATE’s DDNS account, you can create it by
“Create an account”)
6. Click “+Add” button to add a domain.
7. Enter a domain (e.g. test) then click “Check Name” to check the
availability.
8. If the entered domain name is available, it shows “Entered domain
is available for use.” If the domain name is occupied by another user,it
shows “Someone is already using this domain. Please try another.”
9. Enter DVR’s serial number to “Serial Number” input.
10. Enter necessary information into “Description” and click “Add”
button.
11. If you can connect a DVR by using assigned domain name, it means
DDNS setting is properly completed.
(e.g. http://test.mycam.to:8000)
DDNS setting at a DVR
Custom DDNS
48
Also, users can use public DDNS sites such as www.dyndns.org or
www.no-ip.org. Users should refer to those sites directly to get the
registration process.
<Note>
Connection will be enabled in about 10 minutes after domain creates.
WRS
Menu  Network  WRS
If a DVR is connected to cable modem or xDSL modem, ISP(Internet
Service Provider) may change DVR’s IP address unexpectedly . So, the
user can not get the IP address of the DVR.
If a user register a DVR to WRS server, the user can easily connect
the DVR by using Control Center.
WRS Setting
1. Change DVR’s port which is not in use (e.g. 8000)
2. Configure router’s port forwarding setting. (i.e. port 8000 should be
connected to DVR)
3. Enable WRS service at DVR menu.
4. Enter a Group name (e.g. test)
5. Execute Control Center Monitor program, and execute “Add Unit”.
6. Select “Server[WRS] Search” at this menu.
7. Enter the Group name(e.g. test) into Group name input box, and
execute Search.
8. Find your DVR by checking MAC address or Serial number, and enter
DVR’s account information.
9. You could find the added unit at the tree menu and if you click the
icon, you can get video from the DVR.
Group
Group name must be a specific name.
Even if DVR has dynamic IP address, Control Center can easily connect
the DVR by using the Group name.
Status
It shows WRS registration status of the DVR.
49
xDSL
menu  network  network  xDSL
DVR is connected to xDSL line and use PPPoE type, please change
type by xDSL and configure user ID and Password. User ID and
Password should be same as xDSL.
User ID/Passwor
Configure user ID and Password when DVR is connected to xDSL.
Status
It shows connection status of DVR.
Radius
menu  network  RADIUS
Radius function manages many DVR accounts with one account using
Radius server.
Radius menu configures status, IP address, and port. Status should be
configured as enable in order to use Radius function. Port by default
can use 1812 and if server assigns a port, then it needs to be
configured..
‘User ID’, Password’ and ‘Radius Shared Key’ are needed from
administrator of Radius server after forwarding DVR account
information to him.
received ‘ID/Password/Shared key’ are used to register DVR at Control
Center.
<warning>
please consult a server manager to use Radius function.
50
Devie Settings
In Device setup, user can configure camera, monitor, audio, text, serial which are connected to DVR.
Camera
menu  device  camera
Conditions on camera connected to DVR can be set.
Name
Naming per channels.
<Note>
To disable channel for live/recording, please make check box blank
Config
AGC, Contrast, Brightness of connected camera can be adjustable.
<Note>
1. AGC function is only for analog camera(960H, NTSC/PAL ).
2. If BNC is selected image of IP camera can’t be viewed even if IP
camera is connected.
3. To view IP camera, please select IP.
Privacy
Each channel can have 4ea pricacy mask zones (black quadrangle).
Live/Record/Playback image will not be shown in privacy masked zone.
51
PTZ
Menu  Device  PTZ
Port
Choose one of COM2/COM3*
Device
Select a device that is connected to the port.
Address
Select the device’s address that is connected to the port.
Baudrate
Select the device’s baudrate that is connected to the port.
* COM3 may not exist depending on the model.
PTZ ETC
Preset, Auxiliary and home time can be set up
Preset / Auxiliary
Name and value of preset can be set. Up to 16 presets/auxiliaries can be registered.
Etc
• Home time: In case there is not PTZ control for the selected interval, it moves to PTZ home that was
previsouly set in PTZ camera.
• Parity bit/Stop bit/Data bit: Apply the same configuration as configurations of external device
Preset/Auxiliary Setting
• Preset: Load the selected preset, save or delete preset
• Auxiliary: Turn on or off the selected AUX
<Notice>
COM1 is fixed with RS-232C and COM2/COM3 are fixed with RS-485
52
Monitor
menu  device  monitor
Configure SEQ, MULTI, SPOT, VGA.
Sequence configuration
This menu is to edit function of user sequence configuration. User can configure
16 sequence modes and dwell time is available to set from 5 to 60 seconds.
For sequence mode, users can configure channel or division mode and sequence
time from 5 to 60 seconds. If user set it to Off, this function will not work.
The default value of "Restore after Event-Popup" is off. If alarm popup occurs
during sequence mode, sequence mode will be stopped under this condition.
But, if "Restore after Event-Popup" is on, sequence mode will be activated again
after alarm popup time finishes.
Sequence mode starts when user pushes [SEQ] button.
To escape from Sequence mode, please, push [SEQ] button one more time.
53
Multi set-up
Select multi screen order through multi set-up.
set-up..
Maximum of 16 screens can be
SPOT channel and sequence setup
Screen division such as single or multi division or sequence setup can be made.
VGA resolution setup *
Resolution of VGA port can be changed.
Selectable resolution will be 800x600, 1024x768, 1280x1024, 1920x1080, Please
reboot to apply new resolution.
*
Adopted differently based on product specification
54
Audio
menu  device  audio
Configure audio channel, audio recording, volume, synchronization,
mixing on this menu.
Audio channel
Slelect a channel for audio.
Video channel
Configure if selected audio will be synchronized and heard through the
video channel.
For example, if audio channel 1 is synchronized with video channel 4,
then audio will be heard through video channel 4.
Save audio
If users want to save the audio in use. If set “off”, audio will only be
heard with live-video and if set “on”, then audio will be heard during
the playback
During playback, Audio is output together.
Text
menu  device  Text
Configures text info and click “Text” to configure the text.
Max 5 text can be connectable using USB to serial cable.
Recording
Set On/Off of recording of Text input.
Video Ch
Select channel to synchronize with text.
Device
Choose from Manual, Star Finger 007, VSI Pro, VSI Hydra for text input
device.
Manual Text Device Setting
Manual requires header/delimiter/lines/timeouts to be exact. Values
for these are different for every device so please call the store you
purchased the product from or refer to the manual.
Header check
If Text device is set manually and there is the text pointed out as Header,
it is regarded starting of text information from the relevant letter. In
case of not using Header, all text after Delimiter is regarded as new
text.
Delimiter
It is a constantly inserted info to search for the end of the line. If DVR
finds delimiter, it will see the place as the end of the line.
55
The number of Line
It is to define how many lines single information has. For example, if user sets 30 lines, system recognize single
information binding 30 lines.
Time out
If configured line is not full, after the last information, if there is no further information during certain time range,
system deal with it as one information.
<Notice>
Please refer to technical support of manufacturer to use Text using USB to serial cable.
Star Finger 007 and VSI Pro can be used based on protocol already interfaced, Others must be used in Manual.
56
Event Configuration
Event
menu  event  event
Event set up has 4 set up procedures, event, motion, sensor, and
preset.
event
configures time range with event synchronization and can be
configured as off, always, and custom
“always” recognizes and reacts to event when it is configured.
“custom” can only use event during the time preset based on
schedule settings
If custom is configured, event time can be configured per day/time
through schedule setting window
If time isn’t configured on custom or Off box is checked, DVR won’t
recognize any event and thus no event motion or event record will
run.
User schedule setting
If day/time are set, it will display on the graph right away.
Select record begin/end time on the graph and click them in
order, and the corresponding info will be displayed on day/time.
•
•
•
•
•
Day : set applicable day
Time : set applicable time
Add : schedule registration function
Delete Selected : schedule unit delete function
Delete All : whole schedule delete function
Delete schedule
• Delete selected schedule – Select schedule to be deleted then
click on delete button. Click on delete button without select item,
previously selected item will be deleted first and deletion will be
achieved in reverse of time set up.
• Delete all – To delete all schedule.
57
Sync event
Configuration for Event synchronization
Relay
When events that have been selected in “Event Sources” occur, event
notification by relay goes on for the time period set in “Action time”
Buzzer
Event notification by buzzer goes on for the time period set in “Action
time”.
E-mail Setup
When events occur, DVR sends text information and image of event
to certain email address
FTP
When events occur, DVR sends image of event to deginated FTP
server
Video Popup
When events occur, video of event pops up and remain for the time period
System alarm
Image will pop up to notify triggered events upon event from event source happens.
Camera preset
When events occur, PTZ preset runs according to previsous settings
Alarm push
If event in event sourch happens, event notification will be delivered to mobile application(Webeye) in push
alarm.
<Note>
1. To use fire detection feature, please connect WEBGATE’s fire detection camera (C1080BL-AFF2/C1080PBL-AF-F2).
2. Select sensor of fire detection camera channel as Flame Detector.
3. Alarm push feature will be working over Android/IOS Webeye v3.4.x version.
Action Time
• Dwelling time of relay or buzzer: Relay or buzzer remain for the selected time preriod
• E-mail : Sends email according to the interval
• FTP, System alarm, camera preset, Alarm push : Always operate on event
<Notice>
1. If Action time is off, action for events will not work.
2. Event action is working when action is enabled(checked).
58
EVENT SOURCES
Check Sensor, Motion detection, Text or systems for activating event
System event sources of HDD Fail, RAID fail, fan fail, password fail,
WRS registration fail and power on can be checked (some or all)
E-mail Configuration
Recipient Address
Input E-mail address with receiver’s E-mail info.
E-mail format should be xxxx@xxxxxx.xxx and the users must only
use combination of numbers and the English letters
Sender’s E-mail address
Sender’s E-mail address is set when user use E-mail for output
selection and user setup E-mail address as xxxx@xxxxxx.xxx.
Picture attachment
When sensor, motion detector and video loss occur, relevant event info
with channel video will be sent to an e-mail. Only system event info
will be sent for system event.
Authentification
There are a few ways to send email (No authentification, SMTP server authentification and TLS authentification.)
• No authentification: sends email to the recipient address without server authentification
• SMTP authentification: sends email to the recipient after SMTP server authentification. The recipient address
must support SMTP authentification
• TLS authentification : sends email to the recipient after TLS server authentification.
FTP Configuration
The DVR sends 1 video image per event to a FTP server when an
event occurs.
<Note>
Since FTP just transmits an image, if there is no image system event, it is
not supported.
59
Server IP/URL
Enter the FTP server address to send image
user ID
Enter the relevant ID when asked for FTP server authentication.
password
enter FTP server password.
FTP Directory
Select Folder to save image If folder is not indicated, the image is sent to the folder which server selects
Motion detection
menu  event  motion
The Motion detection can be used to notify user
of detected motion on each channel or all channel.
Channel
Configure All or each channel.
Sensitivity
Sensitivity can be configured from min.1 to max 10.
Area
Area configure detection when a motion is triggered.
User can select all or clear all. In case of configuring each channel,
it is available to set all, clear all or define user area.Sensor
User area
When selecting a channel, user area can be configured.
1 grid size is 15x10 and factory default value is “All grid selected”.
Press “change area” button to open motion detector enabled area
set up window.
Users can set motion detection area in screen. The motion detection
zone by setting is indicated in translucent green.
<Notice>
If an area is set up when motion detector set up start point is enabled, all values will be applied as disabled
and if set up when motion detector set up start point is disabled, then all values will be applied as enabled.
In other words, opposite set up to the value of the initially selected area will be applied.
60
Sensor
menu  event  sensor
This menu is to setup the existing sensor input and the type of
sensors. If sensor is selected as N.O, or N.C. it is applied to all
channels. Users can set different options like N.O, N.C, or Off after
selecting each channel.
Name
Normal Open
Normal Close
Flame Detector
description
If
sensor's
electric
contacts
become
connected, DVR recognizes it as an alarm.
If
sensor's
electric
contacts
become
disconnected, DVR recognizes it as an alarm.
It works when fire detection signal is received
from fire detection camera.
<Note>
It turns to Flame detector automatically
camera(C1080PBL-AF-F2) is connected.
61
if
fire
detection
Recording Set Up
Record mode has 3 types as normal/event, schedule/event, emergency record.



Normal/Event record – Record start up upon bootup according to defined program.
Schedule/Event record – Record start up upon defined schedule’s program and time.
Emergency record – Record at max setup regardless of record mode and program. It can be turned on
or off by REC button of remote controller.
Recording
menu  record  record
Both normal/event, schedule/event record can be achieved by selecting program and frame speed and quality
will be defined by program selection. Plesae check each program’s setup (frame, quality) before setup record
mode.
Normal/Event Record
Record starts up upon defined program setup.
Program can be selectable among 9 mode from A to I.
<Note>
1. Event record means recording according to setup of selected
program’s event image between normal/event and
schedule/event when events such as motion detection,
sensor, text and fire detection.
2. To achieve event record (motion detection) only, please put
0fps in normal frame in record setup then put 1~30fps in
event image.
Schedule/Event Record
Record upon defined schedule’s program and time.
Program can be selected among 9 from A to I then can be applied
to each schedule. One program can be applied on one schedule, at
least one schedule per day and max 50 schedules per week can be
defined.
Schedule setup
Select program, time, record start and record end. All this will be
programmed and displayed.
•
•
•
•
•
Program : Set recording program(A~I)
Time : Set time to apply
Add : Schedule registration
Delete Selected : Delete a schedule
Delete All: Deletes the all schedules
62
deletion
• Delete selected schedule – Select schedule to be deleted then click on delete button. Click on delete button
without select item, previously selected item will be deleted first and deletion will be achieved in reverse of
time set up.
• Delete all – To delete all schedule.
<warning>
When configuring time sector, previously configured time can not be included.
Pre Event Duration (Record time before event)
User can select between 1~5sec and time ahead of event will be recorded as much as time set by user.
Post Event Duration (Record time after event)
User can select between 1~30mins and time after event will be recorded as much as time set by user
Emergency Record
It records at max record setup regardless of record mode and program.
Emergency record can be turned on or off using REC button of remote controller.
<Note>
If REC button of remote controller is not working, please set “use” in [Menu-Record-Emergency record].
Program
menu  recording  program
Frame and record quality can be setup using [Program] and record
condition to be used in record mode can be set up.
Select mode from A to I based on record condition or change
frame or quality per channel setup each channel’s frame at user’s
own preference.
Program
There are 9 programs from A to I composing recording quality and
resolution per channel.
Channels
Display the channel No.
video
displays entered video resolution and FRP.
Normal Record
Select frame rate per second and quality that are applied for normal video
without events.
Event Record
Select frame rate per second and quality that are applied when event occurs. When event occurs DVR starts to record
by the frame rate per second and quality of Event Record.
FPS
63
FPS (frames per second) users can select 1 to 30fps per second. Max. Frame can be changed according to the
configuration.
Quality
This configures the recording quality. Value of Q can be configured between 1-10. The higher the number, the better
recording quality is.
Record capacity in use and minimum storable time consumption
It indicates record capacity status of DVR along with amount of connected HDD.
It also indicates storable time of all channels, only channels in use and expected storable time based on amount of
storage duing last 24 hours.
Quick Setting
Apply the same setting for all channels at once.
<Notice>
Frame rate per second and quality cannot be set exceeding the specification of DVR. Please check the specification of DVR first before
setting record.
64
Web Viewer
WebViewer is Web application program loaded to monitor real-time image or to monitor the images recorded
through Web browser to PC located remotely.
System requirement
Recommendation
Items
CPU
Core i5 3.0GHz
Main Memory
Video Memory
8GB
512MB or higher
Display
BUS
1024MB PCI-E Graphic Card Support AGP Accelerate (AMD Radeon HD 7000 Series or
Higher)
Support PCI-E 16X or higher
Network
OS
100/1000 Ethernet NIC
Windows 7(x64) / Windows 8(x64) / Windows 10(x64)
Browser
Others
Internet Explorer 8 or higher
DirectX 9.0 or higher
Installation
Webviewer Installer
Auto installation program is provided from login page to use Webviewer function. ActiveX installation is required
to a PC which has first connection.
<caution>
Please close all programs related to Control Center while Webviewer Installer is being installed. Otherwise, it may affect the
installation.
login
After inputting an IP address that is set to the system, the
WebViewer Login page will be connected.
Examples of input method in address box are
http://192.168.1.100 as IP address type or
www.addresstest.com as domain address. In case of
changing the port value besides default value 80, just input
the changed port value.
Input the set of User ID & Password, click ‘LOGIN’ to access.
If password didn’t change tin Control Center, ID and
Password will be admin/12345.
User set up
To access WebViewer, user authority and password can be changed in DVR or the account menu of Control
Center configuration.
65
Monitor
When it is authorized with User ID & Password input at
Login page, it moves to monitor page. At Monitor page,
monitor real time image of cameras connected to DVR,
or it can control PTZ camera, Relay, and use Microphone
function according to user’s authorization.
screen division and changing video position
The first monitor page will display the maximum screens
of the connected model.
It can to change to 1, 4, 9, 13, 16, 25, 36 divisions by
clicking the number on top of page.
Also, it can change to 1 channel mode by click any one
of channel image.
Double click on one of the playback screen to convert in 1
channel mode
1 After conversion to 1channel mode, double click on
screen to return to previous division channels.
At division screen, it can change screen location using mouse drag
If Ch3 image moves to Ch1, drag Ch3 image and drop on Ch1 location so as to exchange between 3ch and 1ch
image.
Press the very front icon on the upper screen on multi screen mode to switch to a full screen mode.
To go back to normal screen mode from full screen mode, press ESC key
Move to Playback
66
Click the
on the upper right to move to playback page.
channel On/Off
It is On/Off button for the Channel located to left in page.
Click the channel wanted to On or Off.
And Default is “On”.
Sensor indication
The icon indicates when sensor occurs in system
When it sensors, relevant sensor icon comes to Red, and indicates sensor
number of video. When sensor is not triggered, icon keep as blue.
Relay operation
It can On or Off Relay of the unit. Click the number button to activate
Relay On, then the icon Changes from Blue to orange color.
Not activated Relay button means, the product is no supported. Relay is need user’s authority. Refer to user
manual in the unit for the setup of User’s authority of Relay.
Using microphone
Microphone can be set On or Off. Default is Off and it is changed
from the projected type button to orange when click the button for
the use Mic.
Event information
It shows real time event data occurred at the bottom of monitoring page.
Indicated Event data list are as follow
button
,
,
,
67
description
Motion Detect On
Sensor Input
Relay Output On
No Video, Video Detected
video recording & save
video recording
Select by clicking “Rec Start” in right button of Mouse after selecting channel user wants to record during
monitoring. It can record max. 10 minutes of video During Quick Recording, recording time is indicated on video.
If “Rec Stop” is pressed by clicking right mouse button,
recroding stopped. Then, open the dialogue box to store
recorded files. At this time, user can save it to the directory
with any file name by user.
Saved recording file is saved into “*.re4” file format. re4 file can
playback through Control Center Playback program or Mini
Player program.
saving video
There are 3 types for saving Video - jpg, bmp, eye, saving means the function to record 1 frame
of current monitoring channel.
To save video, select the channel and click right button of mouse. and select “Save As” and point out the location
and press Save button.
Using PTZ
During monitoring, select a channel with PTZ configuration
and right-click to select “PTZ” to use PTZ. PTZ control lets
users use Pan/Tilt, Zoom/Focu functions.
Pan, Tilt control
There is a cross line in the middle and click image to operate
Pan, Tilt. In the middle click Left/Right direction to control Pan,
and Click Up/Down direction to control Tilt. The further it is
clicked from the middle, the faster Pan/Tilt will operate.
Zoom, Focus control
Move mouse to the edge of left & right to see slide bar for Zoom, Focus.
The unit Area Zoom In available has Zoom Zero operating button. It can zoom in/out using slide bar at left of
image, left slide bar can control Focus.
Move to Preset
In case of Preset set, Mouse on image press right button for pop-up menu and “Goto Preset” is indicated
additionally. When select Preset list, it moves to Preset position selected. Preset should be set up by user in
advance.
Activating Auxiliary
In case of Preset set, “Auxiliary” is indicated additionally, and it operates action when select registered menu.
<Reference>
Supported PTZ camera list can be refereed to (PTZ manipulation).
68
Using Audio
In case of Channel setup sync with Audio, press
right mouse button on the image to activate popup menu to “Listen” and uncheck Mute. Audio
Volue adjustment is available using slide bar.
Playback
This page is to playback recorded images, and user
who has authority of ‘HDD’ among user ID or
administrator can use this function.
Playback that is made up 16 divisions can play the
images by searching through colander by
recording period and moving the period. It can
backup recorded image and also print Pause image
or save to Bmp file.
Below are each title and function of Playback.
Video Division & Changing Channel
Playback supports 1, 4, 9,16 divisional screens. select division using menu on top of page as shown in the above
picture.
Press the very front icon on the upper screen in multi-screen mode to switch to a full screen mode.
To back normal screen mode from full screen mode, press ESC key.
Save image
It can save playback image to BMP file.
Click mouse to channel to save. Dotted line will be surrounding to
the selected channel, and click ‘Save’ button
Save imamge dialog box appears, then it can input message or
select channel name, date, event and data.
Press ‘OK’ to open dialog box for the saving location, then save
bmp file.
69
Print
Select image with mouse for the channel to print image saved,
and then click ‘Print’ button.
Window comes to input Memo, and click ‘OK’ button to print the
image through the printer connected.
Print material includes ‘Printing Date’, ‘Channel name’, ‘Recording
Date’ ‘Event’, ‘Memo’.
Back up
There are re4 (Multi channel) and avi(single channel) Set
From, To time and select the channel for backup
Point out the location for backup. Input in Password/Verify.
In case of playback backed up file, correct password
should be input.
Move to Web Monitor
Click ‘Go’ button at top of page, and it can move Web monitor page.
channel On/Off
same function as the Channel On/Off function at Web Monitor.
Located on the right, and click the wanted channel to “On” or “Off”. All channels
are On by Default.
Disabled Channel button means the product doesn’t support it.
Saving time & Checking Record Capacity
Displays the used and remaining space of HDD and the dates on which
the first recording and last recording were done. It also shows in %
how much space a user is using.
70
Calendar search
Recorded date is enabled in black color, and others unrecorded date
disabled in grey. Click [Go to] button after select date & time so as to
playback images on the date & time selected.
‘When clicking the ‘Go To’ button, it indicates for 24hours from the time
selected at left bottom. As above picture, it is possible to change the time
zone with ‘24h’ button.
Function buttons on the bottom of an image
① Indicates playback range of recorded image.
② Press , button as the time set at (5) so as to change the time zone to playback in forwarding and
reversing.
③ From left button, it can ‘Move a frame back’, ‘Play backward’, ‘Stop’, ‘Play’, ‘Move a frame forward’.
④ It is the function to set play speed. After click the button, it can set the play speed ‘0.5x, 1x, 2x, 4x, 16x,
32x, 64x, and All’.
⑤ It is the function to set play area. After click the button, it can select play area ‘10min, 30min, 1hour,
3hour, 6hour, 12hour, 24hour’.
⑥ It can select DirectX use or not. If check DirectX mode, it can play image into Direct Draw based on
graphic card and performance of PC.
⑦ It is the function to set audio play or not, and volume
71
JAVA Viewer
Jave Viewer supports DVR monitoring function regardless of operating system.
System requirement
Recommendation
Items
CPU
Main Memory
Core i5 3.0GHz
4GB
Video Memory
Display
512MB or higher
1024MB PCI-E Graphic Card Support AGP Accelerate
BUS
Network
Support PCI-E 16X or highter
100/1000 Ethernet NIC
OS
Windows 7 / Windows 8 / Windows 10 / OS X Mavericks (version 10.9)
Installation
Javaviewer Installer
To use features of JavaViewer, please download JViewer.zip
file then unzip and run “jviewer_start.jar” file.
<Notice>
Please install Java from www.java.com to use Java Viewer
Login
After inputting an IP address that is set to the system, the
WebViewer Login page will be connected.
Examples of input method in address box are
http://192.168.1.100 as IP address type or
www.addresstest.com as domain address. In case of
changing the port value besides default value 80, just input
the changed port value.
Input the set of User ID & Password, click ‘LOGIN’ to access.
If password didn’t change tin Control Center, ID and
Password will be admin/12345.
72
Monitor
When it is authorized with User ID & Password input at
Login page, it moves to monitor page. At Monitor page,
monitor real time image of cameras connected to DVR, or
it can control PTZ camera, Relay, and use Microphone
function according to user’s authorization.
Screen division and changing video position
The first monitor page will display the maximum screens
of the connected model.
It can to change to 1, 4, 9, 16 divisions by clicking the
number on top of page.
Single screen
Double click mouse on the channel wish to make single
channel.
To back to multi screen, please double click again.
Click [
73
] to swith screen into full screen mode. Click on [F11] key to back to normal screen mode.
Playback
Click
[
] to run playback.
Playback is page, where only Authorized or user account
assigned with right for [playback/search] can use.
Playback can be controlled by search, time shift button
or click on time line.
Calendar search
Recorded date is enabled in black color, and others unrecorded date
disabled in grey. Click [] button after select date & time so as to
playback images on the date & time selected.
Record duration and record capacity check
It indicates total recorded capacity and remaining capacity in Hard
disk.
And it marks record start date till last recorded date. Also it shows
amount of Hard diskHDD.
Time line and function button
(1) is range of time line.
(2) From left button, it is backward step playback, backward playback, Pause, forward playback, forward step
playback button.
(3) is setup on playback speed. Playback speed set as following “1/2x, 1x, 2x, 4x, 8x, 16x, 32x, 64x, ALL”.
(4) shows recorded information on the timeline and select preferable time to move to search time.
74
Webeye
Mobile viewer is an Application for Smart Phone. It is available to serach and install
as free of charge with “WebEye” keyword in Apple App store & Google Android
Store.




Available to register up to 16 units
Supports multi-stream function
Able to search system and event logs.
Supports Digital Zoom, PTZ Control, Image saving, Image e-mail sending, etc.
in Single Monitoring Mode.
Mobileviewer
This service allows users to view video by accessing to DVR
from mobile device’s web browser without certain
applications. The device must support either wifi, 3G or Lte.
Input the form of http://IP/svc/mviewer.html to access to DVR
from the web browser
75
Appendix
Problem solving [FAQ]
solution
problem & symptom
If system power isn’t on, LED on the
 Check the power of system
system front won’t operate
 Check power voltage in out
 Check or replace power supply if power doesn’t turn on after
above procedure
No video on some channels with black  Check the camera connected with relevant channel.
screen
Occasionally, the symptom may occur if camera video doesn’t
input correctly.
 Check if power is supplied to camera correctly.
 Occasionally, the symptom may occur with weak video signal
from video distributor when the video is connected with variable
systems. In this case, the symptom can be figured out/ solved
connecting the camera directly to DVR.
No Video on Screen
 Check cable between DVR and camera
 When camera is connected to HD-SDI BNC input :
Check if camera support HD-SDI output
 When HD-SDI BNC output is connected to Monitor BNC directly :
Check if monitor support HD-SDI input
 When HD-SDI video is changed through DVI, VGA, etc. thru video
converter : Check if video format of converter’s HD-SDI input
support s video format of this product.
REC LED doesn’t turn on despite
 Check if HDD space is secured to record
pressing [REC] button in front panel
 Check if recording mode is set in menu
and No recording.
Only logo screen shows repeatedly
 Main board has a problem or SW is damaged. Please contact CS
team for a further check.
Channel button doesn’t work in live
screen.
 If current screen is for event use, channel doesn’t work. In this
case, please terminate event screen pressing [ESC] and select
channel.
Cursor doesn’t move in Calendar
 Check if marked at channel and date you want playback
Search.
 Both channel and date should be checked to start playback.
Alarm doesn’t stop in spite of pressing  Please delete alarm pressing Remote Control [MENU] in front
Remote Control [ESC] button to delete
panel as follows.
after an alarm is triggered.
1) Withdrawing event monitoring screen : Monitoring mode – It
turns off event monitoring time duration.
76
2) For alarm sound cancel : Event record mode - Alarm (Motion
detection/Video loss) – It erases alarm output.
3) For event cancel : Event record mode - Alarm (Motion
detection/Video loss) – It turn off mode.
No response in Live screen even FUNC  Check if connected protocol and other configuration is set
[TOOLS - PTZ] button is pressed.
External HDDs are not recognized as
correctly for PTZ camera in Menu -> Device -> PTZ.
 It takes time to be recognized multiple external HDDs. Try it
quantity installed physically after
again later. If same problem goes on, it is highly originated from
connecting multiple external HDDs to
HDD problem. Please try it with other HDD
DVR.
“HDD FAIL” icon and error message
pops up.
 Please check HDD connection status.
Please contact local dealer if this message continues to pop up
even if there is no problem in connection.
There is no added information of HDD  Please check if additional HDD is compatible with DVR. To know
after installing additional HDD.
more about compatibility, please contact CS team of
manufacturer.
There is no added information of
 Please check if additional storages are compatible with DVR. To
external storage devices (USB memory,
know more about compatibility, please contact CS team of
eSATA HDD)..
manufacturer.
Network setup using router is difficult.  Please refer to product manual for details
 Please refer to UPnP section under “Network connection and
setup” if a user is using router for network connection.
Lost password.
 Please contact CS team of manufacturer.
Copied data is not played in the PC.
 Please don’t remove media during copy or don’t turn off DVR.
 VFS4 (For DVD copy), exe copy is for customized player only so it
can be played using MiniPlayer.
 Please install multi codec for playback data copied in avi format.
Can’t return to live mode during
playback.
Recording is not working.
 Press [□] or [live] button in front panel or remote control to
return to live screen.
 Please check if camera input is well connected
 Please check record mode.
 Please check HDD is ready for record.
 Please check if current time is included in scheduled record time
in case record mode is continuous or event.
 Please press FUNC [TOOL – MANUAL RECORDING] button to
start record.
 In case event record is not working please check event detection
status.
Recorded picture quality is not
good.
77
 Please set picture quality as Q7 for 1080p, Q5 for 720p.
 In case resolution and recording picture quality set high, data
size will become high accordingly so HDD capacity will be
reduced too. It will lead to short period time of recording
Remote control doesn’t work.
 Point to remote control receiver
 Get new batteries.
Compatible HDD
For compatible HDD information, please refer to technical supports of manufacturer.
Factory default set-up values *
System
Time
Current time
Time zone
UTC +09:00 Seoul
Daylight Saving Time (DST)
Set Custom DST
Date/time
off
type
Use Day of Week
Start time
Jan / Last / Sun / 0:00
End time
Feb / Last / Sun / 0:00
Date Format
Sync With NTP
Month/Day/Year
NTP Enable
Off
NTP Mode
Client
NTP Location
Public
NTP Local
0.0.0.0
Interval
1 hour
Disk manager
RAID manager
Disk
Overwrite
On
Block Playback
off / 5Day
Delete Data
off
User
admin
Change ID & PW
User Setup
Channel Rights
Action Rights
Additional User Setup
Utility
All Select
All Select
Auto Login
On / admin
Auto Log-Out
Off / 1 Min
DVR Alias
DVR0
Language
English
Keyboard sound
on
DVR Keyboard ID
1
Remote Controller ID
All
System info
Save status
System log
Firmware upgrade
Configuration setting initialization
Import configuration
Export configuration
Network
Network
Type
Ethernet
78
xDSL
DDNS
WRS
Radius
Automatic Addressing (DHCP)
On
IP Address
192.168.0.2
Net Mask
255.255.255.0
Gateway
192.168.0.1
UPnP Port Forwarding
on
DNS
4.2.2.1 / 0.0.0.0 / 0.0.0.0
Port
80
Bandwidth Limit (Mbps)
unlimited
Video Streaming (RTSP)
Port 554 / Auth On
IP Filtering
off
ID
Guest
Password
********
Status
xDSL is not connected
activate
Turn off
status
Not registered
URL
mycam.to
group
none
Enable
off
Status
Not registered
WNS (mycam.to)
On
Custom DDNS
off
Domain
Generated unique number
Enable
Off
IP Address
0.0.0.0
Port
1812
status
turn on
Name
Cam 1 ~ 16
port
None
device
None
address
1
baudrate
57600
port
None
device
WKC-100
address
1
Baudrate
9600
Auxiliary Enable
on
Home time
off
Parity bit
None
Stop bit
1
Device
Camera
PTZ
keyboard
Etc
Data bit
Edit “SEQ” key sequence
Monitor
Text
79
Cam 1~6
SEQ Rotation
1~4
Interval
5 (Sec)
Restore after Event popup
Edit “MULTI” Key Sequence
Audio
8
SEQ 1~16
off
SEQ Rotation
1~5
Event Popup Enable
off / 3sec
Audio channel
channel 1 ~ 4
Video channel
Channel 1 ~ 4
Audio REC
off
Audio Gain
0
audio output channel
current singl-full video’s audio
Port
COM1
Device
None
Baudrate
2400
Sync Video Channel
Cam1
Recording
Off
Etc
Manual
Parity bit
none
Stop bit
1
Data bit
8
Header check
off
header 1
None
header 2
None
delimiter
0D0A
Time interval(ms)
1000
# of lines
20
Evnet
activate
Turn on
Event check
Event synchronization
always
Relay 1
relay 2
Relay 3
Relay 4
buzzer
Event
Email
FTP
E-mail configuration
FTP configuration
Turn on
Normal event source
turn off all
system event source
Turn off all
Duration period
10 seconds
Turn on
Normal event source
Turn off all
system event source
Turn off all
duration period
10seconds
Turn on
normal event source
Turn off all
system event source
Turn off all
duration period
10seconds
Turn on
normal event source
Turn off all
system event source
Turn off all
duration period
10seconds
Turn off
normal event source
Turn off all
system event source
Turn off all
duration period
10seconds
Turn off
normal event source
Turn off all
system event source
Turn off all
duration period
2mins
Turn off
normal event source
Turn off all
system event source
De-activate
duration period
immediately
sender address
receiver@gmail.com
Receiver address
Dvr1@dvr.com
attach
Turn off
SMTP address
SMTP_SERVER
SMTP ID
email._id
SMTP Password
*******
SMTP port
25
SMTP Auth
Not Use
server IP/URL
FTP_SERVER
80
Motion
Sensor
Preset
FTP channel
/
ID
ftp_user
Password
********
channel
Cam1
activate
Turn on
Sensitivity
5
Area
All Select
activate
Turn on
Sensor
Normal Open, Normal Close, Flame Detector
Channel
Cam1
Preset
S1~S16
None
Motion
None
Text
None
Record
Record
Record Mode
Normal/Eveent Record
Program
A
Pre Event Duration
1
Post Event Duration
1
Program
Program
A
Normal FPS
30
Normal Quality
7
Event FPS
30
Event Quality
7
* Varies between different models
81
Product specification
HS1600F-D
82
HSC1601F-D
83
HSC801F-D
84
Product Dimension
HS1600F-D
85
HSC1601F-D
86
HSC801F-D
87
Open Source License Report on the Product
The software included in this product contains copyrighted software that is licensed under the GPL/LGPL.
You may obtain the complete Corresponding Source code from us for a period of three years after our
last shipment of this product by sending email to <mycctv@gmail.com>.
If you want to obtain the complete Corresponding Source code in the physical medium such as CD-ROM,
the cost of physically performing source distribution might be charged.
GPL Software : busybox, boa, CyaSSL, dosfstools, linux kernel, rp-pppoe, cdrtools, dvd+rw-tools, dhcpcd,
iproute2, smartmontools
LGPL/GPL with exceptions : glibc, libgcc, libstdc++, FFMpeg, ftplib
Apache License : WenQuanYi Micro Hei
Copyright (c) 2007, Google Corp.; Copyright (c) 2008,2009 WenQuanYi Board of Trustees and Qianqian
Fang.
Apache License : Apache Commons
http://commons.apache.org
BSD License : ash, miniupnpc, telnet-server, YUI Library, ppp
Freetype License : freetype2
Portions of this software included in this product are copyright (C) 2010 The FreeType Project
(www.freetype.org). All rights reserved.
IJG License : JPEG
The software included in this product is based in part on the work of the Independent JPEG Group.
MIT License : c-ares, curl, liboauth, jcodec
OpenSSL License : OpenSSL
SIL Open Font License : Arimo
Copyright (c) 2010 Google Corporation.
This Font Software is licensed under the SIL Open Font License, Version 1.1.
This license is copied in this manual, and is also available with a FAQ at: http://scripts.sil.org/OFL
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users. This General Public License applies to most of
the Free Software Foundation's software and to any other program whose authors commit to using it.
(Some other Free Software Foundation software is covered by the GNU Lesser General Public License
instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for
this service if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask
you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the source
code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives
you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there
is no warranty for this free software. If the software is modified by someone else and passed on, we want
its recipients to know that what they have is not the original, so that any problems introduced by others
will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that
redistributors of a free program will individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free
use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright
holder saying it may be distributed under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program" means either the Program or any
derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language. (Hereinafter, translation is
included without limitation in the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running the Program is not restricted, and the output from the Program is
covered only if its contents constitute a work based on the Program (independent of having been made
by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and give any other recipients of the Program a copy of this License along with
the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on
the Program, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the
date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived
from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the
terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when
started running for such interactive use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the program under these conditions, and telling the
user how to view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Program, and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on
the Program, the distribution of the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by
you; rather, the intent is to exercise the right to control the distribution of derivative or collective works
based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a
work based on the Program) on a volume of a storage or distribution medium does not bring the other
work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you also do one of the
following:
a) Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no
more than your cost of physically performing source distribution, a complete machine-readable copy of
the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a
medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code.
(This alternative is allowed only for noncommercial distribution and only if you received the program in
object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an
executable work, complete source code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control compilation and installation of the
executable. However, as a special exception, the source code distributed need not include anything that is
normally distributed (in either source or binary form) with the major components (compiler, kernel, and so
on) of the operating system on which the executable runs, unless that component itself accompanies the
executable.
If distribution of executable or object code is made by offering access to copy from a designated place,
then offering equivalent access to copy the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this
License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or
rights, from you under this License will not have their licenses terminated so long as such parties remain
in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Program or its derivative works. These actions are prohibited
by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work
based on the Program), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically
receives a license from the original licensor to copy, distribute or modify the Program subject to these
terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights
granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of
this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License
and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For
example, if a patent license would not permit royalty-free redistribution of the Program by all those who
receive copies directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the
balance of the section is intended to apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or
to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the
free software distribution system, which is implemented by public license practices. Many people have
made generous contributions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Program under this License may add
an explicit geographical distribution limitation excluding those countries, so that distribution is permitted
only in or among countries not thus excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this
License which applies to it and "any later version", you have the option of following the terms and
conditions either of that version or of any later version published by the Free Software Foundation. If the
Program does not specify a version number of this License, you may choose any version ever published
by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions
are different, write to the author to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN
WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE
RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH
ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best
way to achieve this is to make it free software which everyone can redistribute and change under these
terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each
source file to most effectively convey the exclusion of warranty; and each file should have at least the
"copyright" line and a pointer to where the full notice is found.
one line to give the program's name and an idea of what it does.
Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
type `show w'. This is free software, and you are welcome
to redistribute it under certain conditions; type `show c'
for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General
Public License. Of course, the commands you use may be called something other than `show w' and
`show c'; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a
"copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright
interest in the program `Gnomovision'
(which makes passes at compilers) written
by James Hacker.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your
program is a subroutine library, you may consider it more useful to permit linking proprietary applications
with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this
License.
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works.
The licenses for most software and other practical works are designed to take away your freedom to share
and change the works. By contrast, the GNU General Public License is intended to guarantee your
freedom to share and change all versions of a program--to make sure it remains free software for all its
users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it
applies also to any other work released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to
surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or
if you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to
the recipients the same freedoms that you received. You must make sure that they, too, receive or can get
the source code. And you must show them these terms so they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software,
and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free
software. For both users' and authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the software inside
them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting
users' freedom to change the software. The systematic pattern of such abuse occurs in the area of
products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have
designed this version of the GPL to prohibit the practice for those products. If such problems arise
substantially in other domains, we stand ready to extend this provision to those domains in future
versions of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not allow patents to
restrict development and use of software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could make it effectively proprietary. To
prevent this, the GPL assures that patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS
0. Definitions.
“This License” refers to version 3 of the GNU General Public License.
“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor
masks.
“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as
“you”. “Licensees” and “recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright
permission, other than the making of an exact copy. The resulting work is called a “modified version” of
the earlier work or a work “based on” the earlier work.
88
A “covered work” means either the unmodified Program or a work based on the Program.
To “propagate” a work means to do anything with it that, without permission, would make you directly or
secondarily liable for infringement under applicable copyright law, except executing it on a computer or
modifying a private copy. Propagation includes copying, distribution (with or without modification),
making available to the public, and in some countries other activities as well.
To “convey” a work means any kind of propagation that enables other parties to make or receive copies.
Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a
convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells
the user that there is no warranty for the work (except to the extent that warranties are provided), that
licensees may convey the work under this License, and how to view a copy of this License. If the interface
presents a list of user commands or options, such as a menu, a prominent item in the list meets this
criterion.
1. Source Code.
The “source code” for a work means the preferred form of the work for making modifications to it. “Object
code” means any non-source form of a work.
A “Standard Interface” means an interface that either is an official standard defined by a recognized
standards body, or, in the case of interfaces specified for a particular programming language, one that is
widely used among developers working in that language.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is
included in the normal form of packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that Major Component, or to implement a
Standard Interface for which an implementation is available to the public in source code form. A “Major
Component”, in this context, means a major essential component (kernel, window system, and so on) of
the specific operating system (if any) on which the executable work runs, or a compiler used to produce
the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code needed to
generate, install, and (for an executable work) run the object code and to modify the work, including
scripts to control those activities. However, it does not include the work's System Libraries, or generalpurpose tools or generally available free programs which are used unmodified in performing those
activities but which are not part of the work. For example, Corresponding Source includes interface
definition files associated with source files for the work, and the source code for shared libraries and
dynamically linked subprograms that the work is specifically designed to require, such as by intimate data
communication or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other
parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the Program, and are
irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a covered work is covered by this
License only if the output, given its content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so long as
your license otherwise remains in force. You may convey covered works to others for the sole purpose of
having them make modifications exclusively for you, or provide you with facilities for running those works,
provided that you comply with the terms of this License in conveying all material for which you do not
control copyright. Those thus making or running the covered works for you must do so exclusively on
your behalf, under your direction and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the conditions stated below.
Sublicensing is not allowed; section 10 makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological measure under any applicable law
fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological
measures to the extent such circumvention is effected by exercising rights under this License with respect
to the covered work, and you disclaim any intention to limit operation or modification of the work as a
means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of
technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided
that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep
intact all notices stating that this License and any non-permissive terms added in accord with section 7
apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of
this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or
warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to produce it from the Program, in
the form of source code under the terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions
added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
c) You must license the entire work, as a whole, under this License to anyone who comes into possession
of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the
whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission
to license the work in any other way, but it does not invalidate such permission if you have separately
received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the
Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not
make them do so.
A compilation of a covered work with other separate and independent works, which are not by their
nature extensions of the covered work, and which are not combined with it such as to form a larger
program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the
compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's
users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not
cause this License to apply to the other parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that
you also convey the machine-readable Corresponding Source under the terms of this License, in one of
these ways:
a) Convey the object code in, or embodied in, a physical product (including a physical distribution
medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily
used for software interchange.
b) Convey the object code in, or embodied in, a physical product (including a physical distribution
medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer
spare parts or customer support for that product model, to give anyone who possesses the object code
either (1) a copy of the Corresponding Source for all the software in the product that is covered by this
License, on a durable physical medium customarily used for software interchange, for a price no more
than your reasonable cost of physically performing this conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the written offer to provide the
Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you
received the object code with such an offer, in accord with subsection 6b.
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer
equivalent access to the Corresponding Source in the same way through the same place at no further
charge. You need not require recipients to copy the Corresponding Source along with the object code. If
the place to copy the object code is a network server, the Corresponding Source may be on a different
server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the Corresponding Source. Regardless of
what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as
long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the
object code and Corresponding Source of the work are being offered to the general public at no charge
under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Corresponding Source as
a System Library, need not be included in conveying the object code work.
A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is
normally used for personal, family, or household purposes, or (2) anything designed or sold for
incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases
shall be resolved in favor of coverage. For a particular product received by a particular user, “normally
used” refers to a typical or common use of that class of product, regardless of the status of the particular
user or of the way in which the particular user actually uses, or expects or is expected to use, the product.
A product is a consumer product regardless of whether the product has substantial commercial, industrial
or non-consumer uses, unless such uses represent the only significant mode of use of the product.
“Installation Information” for a User Product means any methods, procedures, authorization keys, or other
information required to install and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must suffice to ensure that the continued
functioning of the modified object code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or specifically for use in, a User Product,
and the conveying occurs as part of a transaction in which the right of possession and use of the User
Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction
is characterized), the Corresponding Source conveyed under this section must be accompanied by the
Installation Information. But this requirement does not apply if neither you nor any third party retains the
ability to install modified object code on the User Product (for example, the work has been installed in
ROM).
The requirement to provide Installation Information does not include a requirement to continue to provide
support service, warranty, or updates for a work that has been modified or installed by the recipient, or
for the User Product in which it has been modified or installed. Access to a network may be denied when
the modification itself materially and adversely affects the operation of the network or violates the rules
and protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with this section must
89
be in a format that is publicly documented (and with an implementation available to the public in source
code form), and must require no special password or key for unpacking, reading or copying.
7. Additional Terms.
“Additional permissions” are terms that supplement the terms of this License by making exceptions from
one or more of its conditions. Additional permissions that are applicable to the entire Program shall be
treated as though they were included in this License, to the extent that they are valid under applicable
law. If additional permissions apply only to part of the Program, that part may be used separately under
those permissions, but the entire Program remains governed by this License without regard to the
additional permissions.
When you convey a copy of a covered work, you may at your option remove any additional permissions
from that copy, or from any part of it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place additional permissions on material,
added by you to a covered work, for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if
authorized by the copyright holders of that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License;
or
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in
the Appropriate Legal Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such
material be marked in reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service
marks; or
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material
(or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that
these contractual assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within the meaning of
section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed
by this License along with a term that is a further restriction, you may remove that term. If a license
document contains a further restriction but permits relicensing or conveying under this License, you may
add to a covered work material governed by the terms of that license document, provided that the further
restriction does not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the relevant source files,
a statement of the additional terms that apply to those files, or a notice indicating where to find the
applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license,
or stated as exceptions; the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly provided under this License. Any
attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular copyright holder is
reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your
license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable
means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder
notifies you of the violation by some reasonable means, this is the first time you have received notice of
violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30
days after your receipt of the notice.
Termination of your rights under this section does not terminate the licenses of parties who have received
copies or rights from you under this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary
propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to
receive a copy likewise does not require acceptance. However, nothing other than this License grants you
permission to propagate or modify any covered work. These actions infringe copyright if you do not
accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance
of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license from the original
licensors, to run, modify and propagate that work, subject to this License. You are not responsible for
enforcing compliance by third parties with this License.
An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of
one, or subdividing an organization, or merging organizations. If propagation of a covered work results
from an entity transaction, each party to that transaction who receives a copy of the work also receives
whatever licenses to the work the party's predecessor in interest had or could give under the previous
paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in
interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this
License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights
granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a
lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing
the Program or any portion of it.
11. Patents.
A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on
which the Program is based. The work thus licensed is called the contributor's “contributor version”.
A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor,
whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by
this License, of making, using, or selling its contributor version, but do not include claims that would be
infringed only as a consequence of further modification of the contributor version. For purposes of this
definition, “control” includes the right to grant patent sublicenses in a manner consistent with the
requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's
essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate
the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express agreement or commitment, however
denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not
to sue for patent infringement). To “grant” such a patent license to a party means to make such an
agreement or commitment not to enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the
work is not available for anyone to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means, then you must either (1) cause the
Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent
license for this particular work, or (3) arrange, in a manner consistent with the requirements of this
License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual
knowledge that, but for the patent license, your conveying the covered work in a country, or your
recipient's use of the covered work in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by
procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the
covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work,
then the patent license you grant is automatically extended to all recipients of the covered work and
works based on it.
A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the
exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted
under this License. You may not convey a covered work if you are a party to an arrangement with a third
party that is in the business of distributing software, under which you make payment to the third party
based on the extent of your activity of conveying the work, and under which the third party grants, to any
of the parties who would receive the covered work from you, a discriminatory patent license (a) in
connection with copies of the covered work conveyed by you (or copies made from those copies), or (b)
primarily for and in connection with specific products or compilations that contain the covered work,
unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses
to infringement that may otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot
convey a covered work so as to satisfy simultaneously your obligations under this License and any other
pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to
terms that obligate you to collect a royalty for further conveying from those to whom you convey the
Program, the only way you could satisfy both those terms and this License would be to refrain entirely
from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have permission to link or combine any covered
work with a work licensed under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this License will continue to apply to the
part which is the covered work, but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of the GNU General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies that a certain numbered
version of the GNU General Public License “or any later version” applies to it, you have the option of
following the terms and conditions either of that numbered version or of any later version published by
the Free Software Foundation. If the Program does not specify a version number of the GNU General
Public License, you may choose any version ever published by the Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU General Public License
can be used, that proxy's public statement of acceptance of a version permanently authorizes you to
choose that version for the Program.
Later license versions may give you additional or different permissions. However, no additional obligations
are imposed on any author or copyright holder as a result of your choosing to follow a later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE
THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS
WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT
HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED
ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect
according to their terms, reviewing courts shall apply local law that most closely approximates an absolute
waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability
accompanies a copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best
way to achieve this is to make it free software which everyone can redistribute and change under these
terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each
source file to most effectively state the exclusion of warranty; and each file should have at least the
“copyright” line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short notice like this when it starts in an
interactive mode:
<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General
Public License. Of course, your program's commands might be different; for a GUI interface, you would
use an “about box”.
You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright
disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the
GNU GPL, see <http://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program into proprietary programs. If
your program is a subroutine library, you may consider it more useful to permit linking proprietary
applications with the library. If this is what you want to do, use the GNU Lesser General Public License
instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>.
GNU LESSER GENERAL PUBLIC LICENSE
Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library
Public License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users.
This license, the Lesser General Public License, applies to some specially designated software packages-typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it
too, but we suggest you first think carefully about whether this license or the ordinary General Public
License is the better strategy to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish); that you receive source code or can get it if you want it; that you can
change the software and use pieces of it in new free programs; and that you are informed that you can
do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to
ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the
recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source
code. If you link other code with the library, you must provide complete object files to the recipients, so
that they can relink them with the library after making changes to the library and recompiling it. And you
must show them these terms so they know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this
license, which gives you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library.
Also, if the library is modified by someone else and passed on, the recipients should know that what they
have is not the original version, so that the original author's reputation will not be affected by problems
that might be introduced by others.
Finally, software patents pose a constant threat to the existence of any free program. We wish to make
sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive
license from a patent holder. Therefore, we insist that any patent license obtained for a version of the
library must be consistent with the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This
license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite
different from the ordinary General Public License. We use this license for certain libraries in order to
permit linking those libraries into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination of
the two is legally speaking a combined work, a derivative of the original library. The ordinary General
Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The
Lesser General Public License permits more lax criteria for linking other code with the library.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom
than the ordinary General Public License. It also provides other free software developers Less of an
advantage over competing non-free programs. These disadvantages are the reason we use the ordinary
General Public License for many libraries. However, the Lesser license provides advantages in certain
special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a
certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be
allowed to use the library. A more frequent case is that a free library does the same job as widely used
non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we
use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of
people to use a large body of free software. For example, permission to use the GNU C Library in nonfree programs enables many more people to use the whole GNU operating system, as well as its variant,
the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the
user of a program that is linked with the Library has the freedom and the wherewithal to run that
program using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to
the difference between a "work based on the library" and a "work that uses the library". The former
contains code derived from the library, whereas the latter must be combined with the library in order to
run.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed
by the copyright holder or other authorized party saying it may be distributed under the terms of this
Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked
with application programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under these
terms. A "work based on the Library" means either the Library or any derivative work under copyright law:
that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or
translated straightforwardly into another language. (Hereinafter, translation is included without limitation
in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a
library, complete source code means all the source code for all modules it contains, plus any associated
interface definition files, plus the scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running a program using the Library is not restricted, and output from such a
program is covered only if its contents constitute a work based on the Library (independent of the use of
the Library in a tool for writing it). Whether that is true depends on what the Library does and what the
program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on
the Library, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and the
date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms
of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an
application program that uses the facility, other than as an argument passed when the facility is invoked,
then you must make a good faith effort to ensure that, in the event an application does not supply such
function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined
independent of the application. Therefore, Subsection 2d requires that any application-supplied function
or table used by this function must be optional: if the application does not supply it, the square root
function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Library, and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on
the Library, the distribution of the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by
you; rather, the intent is to exercise the right to control the distribution of derivative or collective works
based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or with a work
based on the Library) on a volume of a storage or distribution medium does not bring the other work
under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a
given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they
refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version
than version 2 of the ordinary GNU General Public License has appeared, then you can specify that
version instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General
Public License applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a
library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code
or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the
complete corresponding machine-readable source code, which must be distributed under the terms of
Sections 1 and 2 above on a medium customarily used for software interchange.
If distribution of object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place satisfies the requirement to distribute the
source code, even though third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the
Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in
isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative
of the Library (because it contains portions of the Library), rather than a "work that uses the library". The
executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object
code for the work may be a derivative work of the Library even though the source code is not. Whether
this is true is especially significant if the work can be linked without the Library, or if the work is itself a
library. The threshold for this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small
macros and small inline functions (ten lines or less in length), then the use of the object file is
unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code
plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under
the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not
they are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library"
with the Library to produce a work containing portions of the Library, and distribute that work under
terms of your choice, provided that the terms permit modification of the work for the customer's own use
and reverse engineering for debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the
Library and its use are covered by this License. You must supply a copy of this License. If the work during
execution displays copyright notices, you must include the copyright notice for the Library among them,
as well as a reference directing the user to the copy of this License. Also, you must do one of these
things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library
including whatever changes were used in the work (which must be distributed under Sections 1 and 2
above); and, if the work is an executable linked with the Library, with the complete machine-readable
"work that uses the Library", as object code and/or source code, so that the user can modify the Library
and then relink to produce a modified executable containing the modified Library. (It is understood that
the user who changes the contents of definitions files in the Library will not necessarily be able to
recompile the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that
(1) uses at run time a copy of the library already present on the user's computer system, rather than
copying library functions into the executable, and (2) will operate properly with a modified version of the
library, if the user installs one, as long as the modified version is interface-compatible with the version
that the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a charge no more than the cost of performing this
distribution.
d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent
access to copy the above specified materials from the same place.
e) Verify that the user has already received a copy of these materials or that you have already sent this
user a copy.
For an executable, the required form of the "work that uses the Library" must include any data and utility
programs needed for reproducing the executable from it. However, as a special exception, the materials to
be distributed need not include anything that is normally distributed (in either source or binary form) with
the major components (compiler, kernel, and so on) of the operating system on which the executable
runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that
do not normally accompany the operating system. Such a contradiction means you cannot use both them
and the Library together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library
together with other library facilities not covered by this License, and distribute such a combined library,
provided that the separate distribution of the work based on the Library and of the other library facilities
is otherwise permitted, and provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with
any other library facilities. This must be distributed under the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that part of it is a work based on the
Library, and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is
void, and will automatically terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses terminated so long as such
parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Library or its derivative works. These actions are prohibited by
law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work
based on the Library), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically
receives a license from the original licensor to copy, distribute, link with or modify the Library subject to
these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the
rights granted herein. You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of
this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License
and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For
example, if a patent license would not permit royalty-free redistribution of the Library by all those who
receive copies directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the
balance of the section is intended to apply, and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or
to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the
free software distribution system which is implemented by public license practices. Many people have
made generous contributions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Library under this License may add an
90
explicit geographical distribution limitation excluding those countries, so that distribution is permitted only
in or among countries not thus excluded. In such case, this License incorporates the limitation as if written
in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may differ
in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library specifies a version number of this
License which applies to it and "any later version", you have the option of following the terms and
conditions either of that version or of any later version published by the Free Software Foundation. If the
Library does not specify a license version number, you may choose any version ever published by the Free
Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions
are incompatible with these, write to the author to ask for permission. For software which is copyrighted
by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions
for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our
free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO
THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY
AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU
ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS
PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL
OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY
(INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER
SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest possible use to the public, we
recommend making it free software that everyone can redistribute and change. You can do so by
permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General
Public License).
To apply these terms, attach the following notices to the library. It is safest to attach them to the start of
each source file to most effectively convey the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
one line to give the library's name and an idea of what it does.
Copyright (C) year name of author
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Also add information on how to contact you by electronic and paper mail.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a
"copyright disclaimer" for the library, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in
the library `Frob' (a library for tweaking knobs) written
by James Random Hacker.
signature of Ty Coon, 1 April 1990
Ty Coon, President of Vice
That's all there is to it!
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by
Sections 1 through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting
the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled
by, or are under common control with that entity. For the purposes of this definition, "control" means (i)
the power, direct or indirect, to cause the direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial
ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to
software source code, documentation source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source
form, including but not limited to compiled object code, generated documentation, and conversions to
other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the
License, as indicated by a copyright notice that is included in or attached to the work (an example is
provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived
from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications
represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works
shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any
modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to
Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to
submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form
of electronic, verbal, or written communication sent to the Licensor or its representatives, including but
not limited to communication on electronic mailing lists, source code control systems, and issue tracking
systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving
the Work, but excluding communication that is conspicuously marked or otherwise designated in writing
by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has
been received by Licensor and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby
grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license
to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the
Work and such Derivative Works in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby
grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated
in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer
the Work, where such license applies only to those patent claims licensable by such Contributor that are
necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the
Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity
(including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution
incorporated within the Work constitutes direct or contributory patent infringement, then any patent
licenses granted to You under this License for that Work shall terminate as of the date such litigation is
filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any
medium, with or without modifications, and in Source or Object form, provided that You meet the
following conditions:
1.You must give any other recipients of the Work or Derivative Works a copy of this License; and
2.You must cause any modified files to carry prominent notices stating that You changed the files; and
3.You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent,
trademark, and attribution notices from the Source form of the Work, excluding those notices that do not
pertain to any part of the Derivative Works; and
4.If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You
distribute must include a readable copy of the attribution notices contained within such NOTICE file,
excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the
following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source
form or documentation, if provided along with the Derivative Works; or, within a display generated by the
Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE
file are for informational purposes only and do not modify the License. You may add Your own attribution
notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from
the Work, provided that such additional attribution notices cannot be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may prvide dditional or different
license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such
Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise
complies with the conditions stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally
submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this
License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall
supersede or modify the terms of any separate license agreement you may have executed with Licensor
regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks,
or product names of the Licensor, except as required for reasonable and customary use in describing the
91
origin of the Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the
Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR
CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or
conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE.
You are solely responsible for determining the appropriateness of using or redistributing the Work and
assume any risks associated with Your exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence),
contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or
agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect,
special, incidental, or consequential damages of any character arising as a result of this License or out of
the use or inability to use the Work (including but not limited to damages for loss of goodwill, work
stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if
such Contributor has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof,
You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other
liability obligations and/or rights consistent with this License. However, in accepting such obligations, You
may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor,
and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred
by, or claims asserted against, such Contributor by reason of your accepting any such warranty or
additional liability.
END OF TERMS AND CONDITIONS
APPENDIX: How to apply the Apache License to your work
To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed
by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text
should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file
or class name and description of purpose be included on the same "printed page" as the copyright notice
for easier identification within third-party archives.
Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
ash license:
Copyright (c) 1989, 1991, 1993, 1994 The Regents of the University of California.
All rights reserved.
This code is derived from software contributed to Berkeley by Kenneth Almquist
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1.Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3.Neither the name of the University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
miniupnpc license:
Copyright (c) 2005-2009, Thomas BERNARD
All rights reserved.
Redistribution and use of this software in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the author may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
telnet-server license:
Copyright (c) 1989 Regents of the University of California.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1.Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3.All advertising materials mentioning features or use of this software must display the following
acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4.Neither the name of the University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
YUI License:
Copyright (c) 2011, Yahoo! Inc.
All rights reserved.
Redistribution and use of this software in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Yahoo! Inc. nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission of Yahoo! Inc.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
ppp license:
Copyright (c) 1993 The Australian National University.
All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, advertising materials,
and other materials related to such distribution and use acknowledge that the software was developed by
the Australian National University. The name of the University may not be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR
A PARTICULAR PURPOSE.
Copyright (c) 1989 Carnegie Mellon University.
All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, advertising materials,
and other materials related to such distribution and use acknowledge that the software was developed by
Carnegie Mellon University. The name of the University may not be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR
A PARTICULAR PURPOSE.
c-res license:
Copyright 1998 by the Massachusetts Institute of Technology.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and
without fee is hereby granted, provided that the above copyright notice appear in all copies and that both
that copyright notice and this permission notice appear in supporting documentation, and that the name
of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific,
written prior permission.
M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as
is" without express or implied warranty.
curl license:
Copyright (c) 1996 - 2010, Daniel Stenberg, <daniel@haxx.se>.
All rights reserved.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby
granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or
otherwise to promote the sale, use or other dealings in this Software without prior written authorization of
the copyright holder.
liboauth license:
Copyright 2007, 2008 Robin Gareus <robin@gareus.org>
Unless otherwise indicated, Source Code is licensed under MIT license.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, subject to the
following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT
OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
jcodec license:
Copyright (c) 2011 The jcodec project. <http://code.google.com/p/jcodec/>
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, subject to the
following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT
OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
OpenSSL License:
Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1.Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3.All advertising materials mentioning features or use of this software must display the following
acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(http://www.openssl.org/)"
4.The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products
derived from this software without prior written permission. For written permission, please contact
openssl-core@openssl.org.
5.Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their
names without prior written permission of the OpenSSL Project.
6.Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT
OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young(eay@cryptsoft.com). This product
includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are
aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is
covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the author of the parts of
the library used. This can be in the form of a textual message at program startup or in documentation
(online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1.Redistributions of source code must retain the copyright notice, this list of conditions and the following
disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3.All advertising materials mentioning features or use of this software must display the following
acknowledgement:
"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic
related :-).
4.If you include any Windows specific code (or a derivative thereof) from the apps directory (application
code) you must include an acknowledgement:
"This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be
changed. i.e. this code cannot simply be copied and put under another distribution licence [including the
GNU Public Licence.]
SIL OPEN FONT LICENSE
Version 1.1 - 26 February 2007
PREAMBLE
The goals of the Open Font License (OFL) are to stimulate worldwide development of collaborative font
projects, to support the font creation efforts of academic and linguistic communities, and to provide a
free and open framework in which fonts may be shared and improved in partnership with others.
The OFL allows the licensed fonts to be used, studied, modified and redistributed freely as long as they
are not sold by themselves. The fonts, including any derivative works, can be bundled, embedded,
redistributed and/or sold with any software provided that any reserved names are not used by derivative
works. The fonts and derivatives, however, cannot be released under any other type of license. The
requirement for fonts to remain under this license does not apply to any document created using the
fonts or their derivatives.
DEFINITIONS
"Font Software" refers to the set of files released by the Copyright Holder(s) under this license and clearly
marked as such. This may include source files, build scripts and documentation.
"Reserved Font Name" refers to any names specified as such after the copyright statement(s).
"Original Version" refers to the collection of Font Software components as distributed by the Copyright
Holder(s).
"Modified Version" refers to any derivative made by adding to, deleting, or substituting — in part or in
whole — any of the components of the Original Version, by changing formats or by porting the Font
Software to a new environment.
"Author" refers to any designer, engineer, programmer, technical writer or other person who contributed
to the Font Software.
PERMISSION & CONDITIONS
Permission is hereby granted, free of charge, to any person obtaining a copy of the Font Software, to use,
study, copy, merge, embed, modify, redistribute, and sell modified and unmodified copies of the Font
Software, subject to the following conditions:
1) Neither the Font Software nor any of its individual components, in Original or Modified Versions, may
be sold by itself.
2) Original or Modified Versions of the Font Software may be bundled, redistributed and/or sold with any
software, provided that each copy contains the above copyright notice and this license. These can be
included either as stand-alone text files, human-readable headers or in the appropriate machine-readable
metadata fields within text or binary files as long as those fields can be easily viewed by the user.
3) No Modified Version of the Font Software may use the Reserved Font Name(s) unless explicit written
permission is granted by the corresponding Copyright Holder. This restriction only applies to the primary
font name as presented to the users.
4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font Software shall not be used to
promote, endorse or advertise any Modified Version, except to acknowledge the contribution(s) of the
Copyright Holder(s) and the Author(s) or with their explicit written permission.
5) The Font Software, modified or unmodified, in part or in whole, must be distributed entirely under this
license, and must not be distributed under any other license. The requirement for fonts to remain under
this license does not apply to any document created using the Font Software.
TERMINATION
This license becomes null and void if any of the above conditions are not met.
DISCLAIMER
THE FONT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCUDING BUT NOT LIMITED TO ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT OF COPYRIGHT, PATENT, TRADEMARK, OR OTHER RIGHT. IN NO
EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, WHETHER
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF THE USE OR INABILITY TO
USE THE FONT SOFTWARE OR FROM OTHER DEALINGS IN THE FONT SOFTWARE.
92
Manufacturer might service at user’s cost for following request made by customer.
1. Customer notice.
 Please make regular schedule to check unit status (Daily check is recommended).
 Manufacturer will not take any responsibility on the physical/human damage caused by robbery,
natural disaster.
 A/S will include product only manufactured by original manufacturer.
 Any damage caused during installation will be dealt with installation company.
 Manufacturer doesn’t take any responsibility on wrong specified feature excluded in product manual
or described improperly by other shopping mall.
 Please make sure to backup recorded data as recorded data will be removed while manufacturer
repair the unit. Manufacturer will not be responsible for any data loss caused during repair service.
2. Service request for product usage.
 Service request on signal check according to usage environment, power check, network setting.
3. Installation or explanation request on external device to be integrated with this product.
4. Simple assemble or disassemble, adjustment and any request for S/W upgrade.
 Service request for any damage caused by other stuff coming into device.
 In case of simple adjustment without disassemble.
 Just for S/W upgrade (not for product repair)
5. Others
 Any damage comes from carelessness of customer or explanation request for usage.
(Please contact manufacturer for consumable parts)
 Any damage comes from wrong media use and service request for this.
 Any damage comes from wrong installation.
※ We recommend for user to contact (☎+82-1644-3421) before claiming customer
service since customer service will require certain amount of cost.
93
Warranty
Product name
Digital Video Recorder
Model name
HS1600F-D, HSC1601F-D,
HSC801F-D
/
/
Date of purchase
Warranty term
Serial number
/
Customer’s address
Address of shop(Company name)
/
Warranty term
2 years after purchase
(This warranty term can
be changed by contract for
supply.)
Name
Contact
Name
Contact
◈ Please fill out vacant area before selling products.
★ For customer service ★
Please read through product manual before claiming customer service.
Any simple malfunctions due to customer’s misunderstanding on the product will be
fixed by customer’s side.
For requesting service?
Please inform details of malfunctions correctly.
Free or non free repair will be decided based on details of warranty card.
WebGate, Daemyung Corporation Co., Ltd.
6F Hanlim Venture Town B/D 284 Gongdanro Gunpo Gyeonggido, 435-862 Korea
Main
: TEL : +82-31-428-9300
Client Service : TEL : +82-1644-3421
The
1)
2)
3)
4)
5)
damage coming from following condition will be repaired at customer’s cost.
Any damage comes from customer’s carelessness.
In case not recommended power is entered.
In case user repair unit at their own.
Any damage comes from natural disaster (Fire, Flood, etc)
Consumable parts replacement.
94
The World’s
first certified by
HDcctv Alliance
Premium to your HD-CCTV
WEBGATE
WEBGATE Div, Daemyung Corporation Co., Ltd.
6F,Hanlim Venture Town B/D, 284, Gongdan-ro, Gunpo-si, Gyeonggi-do, Korea(15809)
Tel +82. 31. 428. 9383
Fax +82. 31. 455. 3955
sales@webgateinc.com
www.webgateinc.com
95
Download PDF
Similar pages