Samsung DVR SDHP4080 User manual

Samsung DVR SDHP4080 User manual
8 CHANNEL/
16 CHANNEL DVR
User Manual
SDH-P4080/SDH-P4040
SDH-P5080/SDH-V5100/SDH-V5120
8 Channel/
16 Channel DVR
User Manual
Copyright
©2013 Samsung Techwin Co., Ltd. All rights reserved.
Trademark
is the registered logo of Samsung Techwin Co., Ltd.
The name of this product is the registered trademark of Samsung Techwin Co., Ltd.
Other trademarks mentioned in this manual are the registered trademark of their respective company.
Restriction
Samsung Techwin Co., Ltd shall reserve the copyright of this document. Under no circumstances, this document shall be reproduced, distributed or
changed, partially or wholly, without formal authorization of Samsung Techwin.
Disclaimer
Samsung Techwin makes the best to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided.
Use of this document and the subsequent results shall be entirely on the user's own responsibility. Samsung Techwin reserves the right to change the
contents of this document without prior notice.
™™Design and specifications are subject to change without prior notice.
™™The default password can be exposed to a hacking thread so it is recommended to change the password after installing the product.
Set password for your wireless network if you use the product with a wireless router. Being not protected with password or using the
default wireless router password may expose your video data to potential threat.
Note that the security and other related issues caused by the unchanged password shall be responsible for the user.
overview
Important Safety Instructions
Read these operating instructions carefully before using the unit.
Follow all the safety instructions listed below.
Keep these operating instructions handy for future reference.
Read these instructions.
3)
Heed all warnings.
2)
4)
5)
6)
7)
8)
9)
●● overview
1)
Keep these instructions.
Follow all instructions.
Do not use this apparatus near water.
Clean only with dry cloth.
Do not block any ventilation openings, Install in accordance with the manufacturer’s instructions.
Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus
(including amplifiers) that produce heat.
Do not defeat the safety purpose of the polarized or grounding- type plug. A polarized plug has two
blades with one wider than the other. A grounding type plug has two blades and a third grounding
prong. The wide blade or the third prong are provided for your safety. if the provided plug does not fit
into your outlet, consult an electrician for replacement of the obsolete outlet.
10) Protect the power cord from being walked on or pinched particularly at plugs, convenience
receptacles, and the point where they exit from the apparatus.
11) Only use attachments/accessories specified by the manufacturer.
12) Use only with the cart, stand, tripod, bracket, or table specified by the
manufacturer, or sold with the apparatus. When a cart is used, use caution
when moving the cart/apparatus combination to avoid injury from tip-over.
13) Unplug this apparatus during lightning storms or when unused for long periods
of time.
14) Refer all servicing to qualified service personnel. Servicing is required when the
apparatus has been damaged in any way, such as power-supply cord or plug is
damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus has been
exposed to rain or moisture, does not operate normally, or has been dropped.
English _3
overview
CAUTION
RISK OF ELECTRIC SHOCK.
DO NOT OPEN
CAUTION : TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER (OR BACK) NO USER
SERVICEABLE PARTS INSIDE. REFER SERVICING TO QUALIFIED SERVICE PERSONNEL.
This symbol indicates that dangerous voltage consisting a risk of electric shock is present within
this unit.
This exclamation point symbol is intended to alert the user to the presence of important operating
and maintenance (servicing) instructions in the literature accompanying the appliance.
WARNING
• To reduce the risk of fire or electric shock, do not expose this appliance to rain or moisture.
• To prevent injury, this apparatus must be securely attached to the floor/wall in accordance with the installation
instructions.
WARNING
1.
2.
3.
4.
5.
6.
7.
8.
9.
Be sure to use only the standard adapter that is specified in the specification sheet.
Using any other adapter could cause fire, electrical shock, or damage to the product.
Incorrectly connecting the power supply or replacing battery may cause explosion, fire, electric shock, or
damage to the product.
Do not connect multiple cameras to a single adapter. Exceeding the capacity may cause abnormal heat
generation or fire.
Securely plug the power cord into the power receptacle. Insecure connection may cause fire.
When installing the camera, fasten it securely and firmly. The fall of camera may cause personal injury.
Do not place conductive objects (e.g. screwdrivers, coins, metal parts, etc.) or containers filled with water on
top of the camera. Doing so may cause personal injury due to fire, electric shock, or falling objects.
Do not install the unit in humid, dusty, or sooty locations. Doing so may cause fire or electric shock.
If any unusual smells or smoke come from the unit, stop using the product. In such case, immediately
disconnect the power source and contact the service center. Continued use in such a condition may cause fire
or electric shock.
If this product fails to operate normally, contact the nearest service center. Never disassemble or modify this
product in any way. (SAMSUNG is not liable for problems caused by unauthorized modifications or attempted
repair.)
10. When cleaning, do not spray water directly onto parts of the product. Doing so may cause fire or electric shock.
11. Do not expose the product to the direct airflow from an air conditioner.
Otherwise, it may cause moisture condensation inside the Clear Dome due to temperature difference between
internal and external of the dome camera.
12. If you install this product in a low-temp area such as inside a cold store, you must seal up the wiring pipe with
silicon, so that the external air can not flow inside the housing.
Otherwise, external high, humid air may flow inside the housing, pooling moisture or vapor inside the product
due to a difference between internal and external temperature.
4_ overview
Before Start
Warning
Battery
It is essential that when changing the battery in the unit, the replacement battery must be of the same type
otherwise there may be a possibility of an explosion.
The following are the specifications of the battery you are using now.
• Normal voltage : 3V
• Normal capacity : 170mAh
• Continuous standard load : 0.2mA
• Operating temperature : - 20°C ~ +85°C
(-4°F ~ +185°F)
CALIFORNIA USA ONLY
This Perchlorate warning applies only to primary CR (Manganese Dioxide)
Lithium coin cells in the product sold or distributed ONLY in California USA.
“Perchlorate Material - special handling may apply,
See www.dtsc.ca.gov/hazardouswaste/perchlorate.”
Caution
• Connect the power cord into a grounded outlet.
• The Mains plug is used as a disconnect device and shall stay readily operable at any time.
• Batteries shall not be exposed to excessive heat such as sunshine, fire or the like
• Risk of Explosion if Battery is replaced by an Incorrect Type. Dispose of Used Batteries According to the
Instructions.
System Shutdown
Turning off the power while the product is in operation, or undertaking improper actions may cause damage
or malfunction to the hard drive or the product.
Please turn off the power using the Power button on the front of your DVR.
After selecting <OK> in the pop-up menu, you can pull off the power cord.
You may want to install a UPS system for safe operation in order to prevent damage caused by an
unexpected power stoppage. (Any questions concerning UPS, consult your UPS retailer.)
English _5
●● overview
This user manual provides Information for using the DVR such as brief introduction, part names, functions, connection
to other equipment, menu setup, etc.
You have to keep in mind the following notices :
• SAMSUNG retains the copyright on this manual.
• This manual cannot be copied without SAMSUNG’s prior written approval.
• We are not liable for any or all losses to the product incurred by your use of non-standard product or violation of
instructions mentioned in this manual.
• Prior to opening the case, please consult a qualified technician first. Whenever this is needed power must be
removed from the unit.
• Before replacing HDD or connect any external storage device (USB memory, USB HDD, etc.) with this DVR, make
sure that it is compatible with this DVR. Contact the dealer for the list of the compatible devices.
overview
Operating Temperature
The guaranteed operating temperature range of this product is 0°C ~ 40°C (32°F ~ 104°F).
This product may not work properly if you run right after a long period of storage at a temperature below the
guaranteed one.
Prior to using a device that has been stored for a long period in low temperatures, allow the product to stand
at room temperature for a period.
Especially for the built-in HDD in the product, its guaranteed temperature range is 5°C ~ 55°C (41°F ~ 131°F).
Likewise, the hard drive may not work at a temperature below the guaranteed one.
This product may not work properly if the air opening is blocked or if other unit is laid upon this product.
Please install the unit in a well-ventilated place.
Ethernet Port
DVR is designed for indoor use only and all the communication wirings are limited to inside of the building.
Security Precautions
The default password can be exposed to a hacking thread so it is recommended to change the password
after installing the product.
Set password for your wireless network if you use the product with a wireless router. Being not protected with
password or using the default wireless router password may expose your video data to potential threat.
Note that the security and other related issues caused by the unchanged password shall be responsible for
the user.
6_ overview
Contents
3
5
7
9
14
15
16
Important Safety Instructions
Before Start
Contents
Features
Part Names and Functions (Front)
Part Names and Functions (Rear)
Remote Control
connecting with other device
18
19
24
Checking the Installation Environment
Connecting External Devices
Connecting the Network
live
26
29
34
38
38
38
39
Getting Started
Live Screen Configuration
Live Mode
Zoom
Audio ON/OFF
Freeze
Event Monitoring
main menu
40
50
58
61
64
66
75
System Setup
Setting the Device
Setting the Recording
Setting the Event
Backup
Network Configuration
Controlling a PTZ device
3
18
26
40
English _7
●● overview
overview
overview
search & play
78
web viewer
83
backup viewer
113
appendix
115
8_ overview
78
81
Search
Playback
83
84
86
91
94
97
108
109
110
112
Introducing Web Viewer
Connecting Web Viewer (Windows)
Using Live Viewer (Windows)
Controlling a Connected Network Camera
Using Search Viewer
Viewer Setup
About
Connecting Web Viewer (Mac)
Using Live Viewer (Mac)
Mobile Viewer
113 SEC Backup Viewer
115
117
121
123
126
129
Product Specification (Camera)
Product Specification
Product Overview
Default Setting
Troubleshooting
Open Source Announcement
Features
This product can compress 8-channel or 16-channel camera input into a H.264 video clip, or compress 4-channel
HD-UTP input or 4/12-channel composite input, and record in HDD and replay the video at the same time.
These DVRs also supports network connectivity, providing remote monitoring from a remote PC transferring video
and audio data.
• Provides a convenient User Interface
• 8/16 CH Composite/UTP Input Connectors
●● overview
• HD(CH1~4): Supports CIF/2CIF/4CIF/WD/HD recording
• SD(CH5~8/5~16): Supports CIF/2CIF/4CIF/WD recording
• With the network specific codec, network transfer enabled regardless of the recording conditions
• De-interlacing processor for better picture quality
• Display of HDD information and status by using HDD SMART
• HD CODEC performance: Full HD 120IPS
• SD CODEC performance: 4CIF 120IPS/360IPS
• Hard Disk overwrite function
• Mass storage hard disk backup through high-speed USB 2.0
• Simultaneous Record and Playback of 8/16-channel video data
• Various Search Modes (Time, Event, Backup, Motion Detection)
• Various Recording Modes (Manual, Event, Scheduled Recording)
• Alarm Interface
• Remote Monitoring on the Smart Viewer or the Mobile Viewer
• Tampering Detection
Standards Approvals
equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the
MM `` This
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment.
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with
the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference in which case the user will be required to correct the interference at
his own expense.
English _9
overview
Package Contents
Please unwrap the product, and place the product on a flat place or in the place to be installed.
Please check the following contents are included in addition to the main unit.
SDH-P5080
POWER
REC
NETWORK
SDR-5200 16CH DVR
Adapter/Power Cable
Adapter/Power Cable (For SD cameras)
Camera Gender
Remote Control /
Remote Control Battery (AAA x 2)
Mouse
SDC-8340BU (UTP) 4EA
SDC-5340BC (BNC) 4EA
Camera Cable (SDC-8340BU) 4EA
Camera Cable (SDC-5340BC (BNC)) 4EA
Network Cable
CD (User Manual, Quick Guide,
Router Guide)
Quick Guide/Warranty Card
10_ overview
SDH-V5100
POWER
REC
NETWORK
Adapter/Power Cable
Adapter/Power Cable (For SD cameras)
Camera Gender
Remote Control /
Remote Control Battery (AAA x 2)
Mouse
SDC-8340BU (UTP) 4EA
SDC-5340BC (BNC) 6EA
Camera Cable (SDC-8340BU) 4EA
Camera Cable (SDC-5340BC (BNC)) 6EA
Network Cable
CD (User Manual, Quick Guide,
Router Guide)
Quick Guide/Warranty Card
●● overview
SDR-5200 16CH DVR
English _11
overview
SDH-P4040
POWER
REC
NETWORK
SDR-4200 8CH DVR
Adapter/Power Cable
Mouse
SDC-8340BU (UTP) 4EA
Remote Control /
Remote Control Battery (AAA x 2)
Camera Cable (SDC-8340BU) 4EA
Network Cable
CD (User Manual, Quick Guide,
Router Guide)
Quick Guide
12_ overview
SDH-P4080
POWER
REC
NETWORK
Adapter/Power Cable
Adapter/Power Cable (For SD cameras)
Camera Gender
Remote Control /
Remote Control Battery (AAA x 2)
Mouse
SDC-8340BU (UTP) 4EA
SDC-5340BC (BNC) 4EA
Camera Cable (SDC-8340BU) 4EA
Camera Cable (SDC-5340BC (BNC)) 4EA
Network Cable
CD (User Manual, Quick Guide,
Router Guide)
Quick Guide/Warranty Card
●● overview
SDR-4200 8CH DVR
English _13
overview
Part Names and Functions (Front)
POWER
a
REC
NETWORK
b
Part Names
a
USB Port
Functions
Connects the USB devices.
POWER : Displays the power ON/OFF status.
b
LED Indicator
REC : Lights on when recording is in progress.
NETWORK : Displays both network connection and data transfer status.
14_ overview
Part Names and Functions (Rear)
SDR-4200 8CH DVR
a
b
c
VGA
1
3
AUDIO IN
2
4
AUDIO OUT
5
6
VIDEO IN
7
7
8
8
13
9
14
d
NETWORK
e-SATA
HDMI
e
HD VIDEO IN
CONSOLE
POWER
10
15
16
RS-485
1
i
3
4
DC-12V
h g f
SDR-5200 16CH DVR
a
b
c
VGA
1
3
AUDIO IN
2
4
AUDIO OUT
5
6
11
7
12
8
VIDEO IN
13
9
14
d
NETWORK
e-SATA
HDMI
e
HD VIDEO IN
CONSOLE
POWER
10
15
16
RS-485
1
j
i
2
3
4
DC-12V
h g f
Part Names
Functions
a
AUDIO IN
Audio input signal port (RCA jack).
b
VIDEO IN
Composite Video Signal Input Port (BNC type connector).
c
VGA
VGA Video Signal Output Port.
d
HD VIDEO IN
HD video signal input port (UTP type connection).
JJ This unit can be connected with Samsung HD UTP cameras only.
e
POWER
Camera and DVR power input port.
f
HDMI
HDMI connector port.
g
e-SATA
Ports used for external storage device connections.
h
NETWORK
NETWORK connector port.
i
RS-485
Used to control the camera which supports PTZ (Pan Tilt Zoom).
j
AUDIO OUT
Output port (RCA jack) for the audio signal.
MM `` [CONSOLE] is designed for the service repair purpose only.
English _15
●● overview
j
2
overview
Remote Control
SEARCH
Displays the search menu.
MODE
Changes the screen mode.
POWER
Displays the Exit pop up screen.
BACKUP
Displays the Backup Menu.
OPEN/CLOSE
Opens or closes the CD tray.
DVR
Activates the DVR function.
NUMBER [0~+10]
Used as the numeric input keys, or displays a single
channel.
ID
Skip Backward (by unit time),
Slow Rewind, Slow Forward,
Skip Forward (by unit time)
Sets the ID of the system.
Select 2 digits from 0 ~ 9 while pressing the ID Key.
Move Frame
While paused, moves to the previous/next frame.
FR, STOP, PLAY/PAUSE, FF
T/W
Zooms in or out.
MENU
Goes to the system menu screen.
Up/Down/Left/Right($%_ +)/ENTER
Moves the cursor up/down/left/right, and runs the Select
Menu.
FREEZE
Freezes the screen temporarily.
ZOOM
Runs the digital zoom (x2) function.
REC
Starts or ends the live recording.
VIEW
Runs the View function in the PTZ mode.
16_ overview
PTZ
Displays or ends PTZ.
SCROLL ,.
Moves the menu scroll.
RETURN
Returns to the previous screen.
AUDIO
Turns Audio on/off.
ALARM
Cancels the Alarm.
REC LOCK
Selects the recording lock function.
PRESET
Displays the Preset Setup.
Using the Numeric buttons
CHANNEL 1–9
CHANNEL 10
CHANNEL 11–16
Press each button between 1 to 9.
Press the [+10] button first, then press the 0 button again within 3 seconds.
Press the [+10] button first, then press any number between 1 to 6 within 3 seconds.
1. Press the ID button of the remote control and check the ID displayed on the DVR screen.
The factory default ID of the remote control is 00.
2. Enter 2 digits of your selection in order, while pressing the [ID] button of the remote control.
3. When ID input is done, press the [ID] button of the remote control again to check the setting.
you want to change the remote control ID to 08: Press 0 and 8 in order while the [ID] button of the remote control is
MM `` Ifpressed.
Remote control’s ID and DVR’s ID should be matched for proper operation. Refer to “Remote Devices”. (Page 63)
English _17
●● overview
Changing the Remote Control ID
connecting with other device
installation
Please take note of the followings before using this product.
•
•
•
•
•
•
•
•
Do not use the DVR outdoor.
Do not spill water or liquid in the connection part of the product.
Do not impose the system to excessive shock or force.
Do not pull out the power plug forcefully.
Do not disassemble the product on your own.
Do not exceed the rated input/output range.
Use a certified power cord only.
For the product with an input ground, use a grounded power plug.
Checking the Installation Environment
Samsung Digital Video Recorder (“DVR” hereinafter) is a state-of-art
security device, and contains mass storage hard disk(s) and critical
circuits inside.
Temperature Unit: ºC
One Year: 24HR X 365 DAY =8,760 HR
When the temperature rises inside the product, the product may
breakdown and the product life be shortened. Please pay attention to
the following recommendations before installation.
[Figure 1]
The followings are the recommendations when Samsung DVR is installed on a rack.
1. Please ensure that the rack inside is not sealed.
2. Please ensure the air is circulated through the inlet/outlet as shown in the picture.
3. If the DVR or other devices on a rack is to be stacked as in the picture, provide a
suitable space or install a ventilating opening for air circulation.
4. For natural air convection, place the inlet at the bottom of the rack and the outlet on top.
5. It is strongly recommended that a fan motor is installed at the inlet and the outlet for
air circulation. (Please fit a filter at the inlet to screen dust or foreign substances.)
6. Please maintain the temperature inside the rack or surrounding areas between
0°C ~ 40°C (32°F ~ 104°F) as shown in the figure 1.
Rack Mount Instructions - The following or similar rack-mount instructions are included
with the installation instructions :
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the
operating ambient temperature of the rack environment may be greater than room
ambient. Therefore, consideration should be given to installing the equipment in an
environment compatible with the maximum ambient temperature specified by the
manufacturer.
B) Reduced Air Flow - Installation of the equipment in a rack should be such that the
amount of air flow required for safe operation of the equipment is not compromised.
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a
hazardous condition is not achieved due to uneven mechanical loading.
D) Circuit Overloading - Consideration should be given to the connection of the
equipment to the supply circuit and the effect that overloading of the circuits might
have on overcurrent protection and supply wiring. Appropriate consideration of
equipment nameplate ratings should be used when addressing this concern.
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should be
maintained. Particular attention should be given to supply connections other than
direct connections to the branch circuit (e.g. use of power strips).
18_ connecting with other device
DVD
DVD
DVD
DVD
DVD
DVD
DVD
Life (Unit: HOURS)
RECORDER
RECORDER
RECORDER
RECORDER
RECORDER
RECORDER
RECORDER
USB
USB
USB
USB
USB
USB
USB
DVD
DVD
DVD
RECOR
DER
RECOR
DER
USB
RECOR
DER
USB
[Figure 2]
DVD
DVD
RECOR
DER
RECOR
DER
USB
USB
Connecting External Devices
1
3
AUDIO 2
IN
4
5
AUDIO
OUT
6
11
7
12
8
VIDEO
IN
13
9
14
VGA
10
15
NETWO
RK
RS-485
e-SATA
HDMI
CONSOL
E
HD VID
EO IN
POWE
R
1
2
3
4
DC-12
V
Connecting the USB
1. By factory default, a USB port is provided for external connection.
2. You can connect a USB HDD, USB memory or mouse to the USB port.
3. If a USB HDD is connected to the system, recognition and settings are available in “Main Menu > Device
> Storage Device”. (Page 61)
4. This product supports hot-plugging, which connects/removes the USB device during the system
operation.
JJ `` If you use the USB device for Backup purposes, format it with FAT32 on PC if it is not formatted on the DVR.
Connecting External SATA HDD (eSATA)
External SATA port is provided on the rear panel.
If connected to the system, the external SATA HDD (eSATA) can be recognized and configured in “Main Menu >
Device > Storage Device”.
JJ `` Use a cable shorter than 1 m for the external external SATA HDD (eSATA) connections.
`` Unexpected disconnection to a device in use which is connected via eSATA may restart the system. Check whether the
device is in use before disconnecting it.
English _19
●● connecting with other device
16
connecting with other device
Connecting the RS-485 Device
Connect the PTZ camera with the [RS-485 +/-] port on the back of the unit.
MM `` You can connect and control the PTZ camera which supports the RS-485 communication.
`` Check if the RS-485 device is compatible with the product first.
`` Pay attention not to change the polarity (+/-) of the RS-485 device when connecting it.
`` Depending on camera’s type, connection polarity can be different.
For further information, refer to the respective PTZ Camera’s documentation.
1
3
AUDIO 2
IN
4
5
AUDIO
OUT
6
11
7
12
8
VIDEO
IN
13
9
14
VGA
10
15
16
NETWO
RK
RS-485
e-SATA
HDMI
CONSOLE
HD VIDE
O IN
POWER
1
PTZ Camera
20_ connecting with other device
2
3
4
DC-12V
Connecting the Camera
Equipped with the IR LED and the illumination sensor, enables you to monitor at night as well as in daytime.
The camera is suitable for both internal and external use.
1
AUDIO 2
IN
4
5
AUDIO
OUT
6
11
7
12
8
VIDEO
IN
13
9
14
VGA
10
15
●● connecting with other device
3
16
NETWO
RK
RS-485
e-SATA
HDMI
CONSOLE
HD VID
EO IN
POWER
1
SDC-8340BU
2
3
4
DC-12V
SDC-5340BC
a
b
c
Name
Description
a
IR LED
These infrared LED's are controlled by the illumination sensor.
b
Lens
You can monitor wider range.
c
Illumination Sensor
Detects incoming light to control the IR LED.
English _21
connecting with other device
RJ-45 Cable (Length: 18.3m, 60ft)
This cable is specific to UTP connection, which is not compliant with the LAN cable. You can use the UTP
direct cable (all of 8 pins are used) to extend the length to a max of 100m. (based on UTP CAT 5e)
CVBS+
1
2
3
4
5
6
7
8
N.C
CVBS-
N.C
GND
12V
N.C
Camera
N.C
Name
CVBS+
CVBSAUDIO
GND
12V
N.C
N.C
N.C
<Cable pin information
provided>
Cable
not plug any other cable except normal direct cable in the camera UTP port.
JJ `` Do
Do not plug any other cable except the one connected with the camera in the camera HD UTP port.
Installing the camera
The camera can be installed on the wall, ceiling, shelf or a desired position using the provided bracket.
SDC-8340BU
wall or ceiling
SDC-5340BC
wall or ceiling
1. Select a position where you want to install the camera.
`` Make sure the selected position can sustain the weight of the camera.
2. Use the screw bolts to mount the camera bracket onto the wall or ceiling.
should be careful when installing the BOX camera outdoors because the cable connectors may be wet with moisture
JJ `` You
or pile up with impurities.
22_ connecting with other device
Adjusting the Camera Bracket
1. Choose an installation site that can sufficiently support the weight of the equipments to be installed.
2. Attach the camera bracket to the wall using the supplied screws.
3. Adjust the direction of the camera to the desired direction, and fix bracket.
4. Fix the camera.
●● connecting with other device
SDC-8340BU
SDC-5340BC
5. Connect the camera cable to the camera.
English _23
connecting with other device
Connecting the Network
Connecting to Network through Ethernet (10/100/1000BaseT)
1
3
AUDIO 2
IN
4
5
AUDIO
OUT
6
11
7
12
8
VIDEO
IN
13
9
VGA
10
14
15
16
NETWO
RK
e-SATA
RS-485
HDMI
RJ-45 Ethernet Cable
(Direct Cable)
CONSOLE
HD VIDE
O IN
POWER
1
2
3
4
DC-12V
Hub/Switcher
Back B
one
NETWORK
Windows
Network Viewer
Hub/Switche
Connecting to the Network using the router
1
3
AUDIO 2
IN
4
5
AUDIO
OUT
6
11
7
12
8
VIDEO
IN
13
9
14
VGA
10
15
16
NETWO
RK
RS-485
e-SATA
HDMI
CONSOLE
HD VIDE
O IN
POWER
1
2
3
4
DC-12V
Broadband Router
xDSL or Cable Modem
xDSL or Cable Modem
NETWORK
External Remote PC
DDNS Server
(Data Center)
24_ connecting with other device
Connecting to Network through PPPoE
1
3
AUDIO 2
IN
4
5
AUDIO
OUT
6
11
7
12
8
VIDEO
IN
13
9
14
VGA
10
15
16
NETWO
RK
RS-485
e-SATA
HDMI
CONSOLE
HD VIDE
O IN
POWER
1
Phone
(PPPo
Windows
Network Viewer
E) Line
3
4
●● connecting with other device
PPPoE MODEM
RJ-45 Ethernet Cable
(Direct Cable)
2
DC-12V
NETWORK
Hub/Switcher
English _25
live
Getting Started
Starting the system
1. Connect power cable to the product’s rear.
takes about 10 seconds to display the start screen after
MM `` Itbooting.
REC
2. The boot up screen appears.
Booting up may take about 3 minute, as indicates
progress with icons.
If a new HDD is installed, the initialization process may
take longer.
REC
3. The live screen appears with a beep.
26_ live
2013-01-01 01:10:25
Shutting Down the System
You can shut down the system only if you have logged in to the DVR as administrator.
1. Press the [POWER] button on the remote control or
right-click to display the context sensitive menu and select
<Shutdown>.
2. The “Shutdown” confirmation window appears.
Shutdown
Are you sure to shutdown?
OK
●● live
3. Use the arrow keys on the remote control to move to
<OK> and press the [ENTER] button or click <OK>.
When “Disconnect the power cable” pops up,
disconnect the power cable and shut off the unit.
2013-01-01 01:10:25
Cancel
the permission management, refer to “Permission
MM `` For
Management > Setting Permissions”. (Page 45)
Login
To access a DVR or restricted menu, you should have logged in to the DVR.
1. In live mode, right-click any area of the screen.
You will see the context sensitive menu as in the right
figure.
2013-01-01 01:10:25
Scene Mode 
Audio Off
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Login
2. Click <Login>.
The login dialog appears.
You can also see the login dialog to access a desired
menu by pressing the [MENU] button on the remote
control.
`` The login dialog will also appear if you press a menu button on the
remote control of the DVR when the corresponding menu requires
logging in.
2013-01-01 01:10:25
Login
 ID
admin
 Password
OK
Cancel
`` After logged in, press [RETURN] on the remote control to display the
logout dialog.
`` By default, initial ID and password are set to “admin”, and “4321”.
MM `` For the restricted permission, refer to “Permission Management > Setting Permissions”. (Page 45)
English _27
live
default password can be exposed to a hacking thread so it is recommended to change the password after installing
JJ `` The
the product.
`` Set password for your wireless network if you use the product with a wireless router. Being not protected with password or
using the default wireless router password may expose your video data to potential threat.
`` Note that the security and other related issues caused by the unchanged password shall be responsible for the user.
Locking All Buttons
This will restrict access to all buttons available in the DVR.
1. In Live mode, press buttons in the order of [STOP (@)]
[FREEZE][STOP (@)][FREEZE][MENU].
<All Key Lock> confirmation window appears.
2. Select <OK>.
All keys are locked.
3. In the lock condition, press any button to display a dialog
where you are prompted to enter the password for
unlocking the buttons.
The button lock will be released if you enter the admin
password.
28_ live
2013-01-01 01:10:25
All Key Lock
Are you sure to all key lock?
OK
Cancel
Live Screen Configuration
Icons on the Live Screen
You can check the status or operation of the DVR with the icons on the live screen.
a
d
d
b
c
●● live
2013-01-01 01:10:25
CAM 01
g f
Part Names
a
b
Current Date, Time
Login Information
e
Displays the current time and date.
Functions
When you are logged in, the “LOG ON” icon will be displayed.
Displayed if the zoom function is activated.
c
Screen Mode
Displayed if you press the Pause button.
Displayed in Auto Sequence mode where all channels are switched at the specific time
interval.
Displayed if the recording is in process.
`` To cancel the recording, enter the password.
Displayed if the HDD is full and the DVR has an insufficient space to record.
d
System
Operation
Displayed if no HDD is installed or the existing HDD should be replaced.
Displayed if the HDD needs a technical examination.
Displayed while the backup is in process or if the backup data is played.
Displayed if a new firmware is found from the network.
English _29
live
Part Names
e
f
Functions
Displayed if no input is entered in the condition that the camera is set to <ON>.
Video Input
Status
Nothing will be displayed on the screen if the camera is set to <OFF>.
Camera Name/ Channel
Displays the camera name and the changed channel, if any.
Displayed in PTZ setting, and highlighted yellow if PTZ is in operation.
g
Displays AUDIO ON/MUTE.
Not displayed in video mode if deactivated.
Camera
Operation
Displayed if a motion detected in the condition that the motion detection is set to <ON>.
Appears when the Tampering Detection is set to <ON> and a tampering attempt is
detected.
Displays the current record mode from Record/Event/Schedule.
Error Information
• If the internal HDD is not connected, the “NO HDD”(
) message will appear; if there occurs a problem,
you will see the “HDD FAIL”(
) message in the top left corner. In this case, make sure you contact the
service center for assistance as this may cause a failure of recording, playback or backup.
MM `` If you see the No HDD, HDD FAIL icons on the screen, contact the service center for more details.
Live Screen Menu
In addition to the buttons the remote control, you can access a desired menu by right-clicking the mouse any
area in live mode.
Right click opens the context menu which shows different menu items according to the situation, such as
logged in/out state, split screen mode, and various operational conditions.
MM `` Menu items of Search, Record, Backup, Shutdown and PTZ can be deactivated, depending on the user permission.
Scene Mode
2013-01-01 01:10:25

2013-01-01 01:10:25
Audio Off
Scene Mode 
Freeze
PTZ Control
Stop Alarm
Zoom In
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
Audio
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
< Split Mode Menu >
30_ live
< Single Mode Menu >
Split Mode Menu
The context sensitive menu in split mode differs, depending on the login/logout status.
Scene Mode

2013-01-01 01:10:25
Audio Off
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
Menu
a
b
c
d
e
f
g
h
i
j
k
l
c
a
●● live
l
k
j
i
h
g
f
e
d
b
Scene Mode
Refer to “Live Mode”. (Page 35)
Freeze
Refer to “Freeze”. (Page 38)
Audio On/Off
Stop Alarm
Record/Stop
Functions
Refer to “Audio ON/OFF”. (Page 38)
Stops the alarm output and the event monitoring. Refer to “Event Monitoring”. (Page 39)
Starts/stops the standard recording.
Play
Plays the search result (data). Refer to “Search & Play > Play”. (Page 83)
Backup
Refer to “Main Menu > Setting the Backup”. (Page 66)
Search
Main Menu
Refer to “Search & Play > Search”. (Page 80)
Accesses the main menu. Refer to the Using the DVR section. (Page 40)
Shutdown
Turns down the DVR.
Login/Logout
You can log in or out.
Show/Hide Launcher
Shows or hides the launcher. Refer to “View the Launcher Menu”. (Page 34)
English _31
live
Single Mode Menu
The single mode menu is available only in Single Mode.
The menu, which appears as <Screen Mode> on a single screen, appears as <Full Screen> after selecting
only one channel on a split screen.
2013-01-01 01:10:25
Scene Mode 
PTZ Control
Zoom In
Audio
c
b
a
a
Full Screen
b
PTZ Control
c
Zoom In
32_ live
PTZ Control
Zoom In
Audio
Freeze
Freeze
Stop Alarm
Stop Alarm
Record
Record
Play
Play
Search
Search
Backup
Backup
Main Menu
Main Menu
Shutdown
Shutdown
Hide Launcher
Hide Launcher
Logout
Logout
< Single Mode Menu >
Menu
2013-01-01 01:10:25
Full Screen
< Menu after selecting one channel
on the split screen >
Functions
Select and click a desired channel in Split mode to switch to the full screen of the selected
channel.
Accesses the PTZ Control menu.
The PTZ menu is activated only in One-Channel Live mode. (Page 77)
Enlarges the selected image. (Page 38)
View the Launcher Menu
The Launcher menu appears on the bottom of the live screen.
1. In Live mode, right-click to display the context menu and select <Show Launcher>.
2. Move the cursor to the bottom and click a desired item in the Launcher menu.
MM `` If no input is entered for 10 seconds, the menu will disappear.
`` The Launcher menu can be accessed only by using the mouse.
●● live
`` SDH-P4080/SDH-P4040 do not support the 16-split screen mode.
2013-01-01
01:10:25
2013-01-01
01:10:25
a
b
Menu
a
Date/Time
b
Screen Mode
c
d
e
Menu Expansion Button
f
PTZ
g
h
i
j
Alarm
Audio
Zoom
Freeze
Play
Record
c d e f g h ij
Functions
Displays the current time and date.
The indication of AM/PM is displayed if you set 12 hours for the time format in “System >
Date/Time/Language > Time”. (Page 40)
Press this button to switch the screen mode in sequence.
The current mode is highlighted in white.
Click to display the hidden menu to the right.
Turns ON/OFF the sound of the selected channel.
Enlarges the selected area. This is available only in Single Live mode.
Runs the PTZ Control launcher.
The PTZ control launcher will be active on the Live screen after you select a single channel.
Stops the alarm if it's activated.
Freezes the Live screen temporarily.
Enters Play mode if a file to play exist, and if not, enters Search mode.
Start/End recording the Live screen.
English _33
live
Live Mode
CH1
CH3
SDH-P5080/SDH-V5100/SDH-V5120 display Live images from
16 CH2
channels
in CH4
a total of CH1
8 layoutCH2of split CH3
screens.
Switching the screen mode
CH5
CH6
CH7
CH8
CH9
CH10
CH11
CH12
CH13
CH14
CH15
CH16
CH1
CH9
CH10
CH2
CH11
CH12
CH15
CH16
CH4
CH2
CH5
CH4
CH5
CH6
CH7
CH8
CH9
CH4
CH5
CH6
CH7
CH8
CH9
To switch the split mode, select a screen mode in the launcher menu, or right-click to select a screen mode in
the context menu.
CH1
CH2
CH3
CH4
CH1
CH3
Press
the
button on the remote control to switch the mode in the sequence
of theCH2launcher
menu
CH1
CH2 [MODE]
CH3
CH4
CH1
CH2
CH3
CH2
CH5
CH6
CH7
CH8
items.
CH5
CH6
CH7
CH8
MM
CH9
CH13
CH4
CH15
CH16
CH1
CH2
CH3
CH4
CH5
CH6
CH7
CH8
CH13
CH3
CH2
CH1
CH10
CH2
CH11
CH14
CH15
CH16
CH3
CH4
CH2
CH5
CH10
CH2
CH12
CH4
16-split mode
CH6
CH8
CH3
CH1
CH7
CH19
CH4
CH11
CH12
CH13
CH3
CH4
CH5
13-split mode
CH8
CH1
CH10
CH11
CH1
CH8
CH9
CH1
CH2
CH3
CH4
CH5
CH1
CH7
CH4
CH8
CH5
CH1
CH1
CH4
CH4
CH19
CH12
CH2
CH2
CH4
CH13
CH5
CH9
CH1
CH2
CH3
CH1
CH2
CH9
CH8
CH3
CH1
CH6
CH7
CH2
CH2
CH3
CH5
CH6
CH3
CH6
CH5
CH7
16(A)-split mode
CH1
CH2
CH3
CH4
CH5
CH6
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH1
CH3
CH11
CH13
CH14
CH7
CH8
CH9
CH9
CH16
CH1
CH2
CH3
CH10
CH6
CH5
CH13
CH9
CH16
CH1
CH4
CH6
CH5
CH7
CH8
CH2
CH2
CH4
CH3
CH2
CH2
CH3
CH11
CH14
CH7
CH5
CH6
CH13
CH3
CH4
CH5
CH8
CH1
CH10
CH11
CH1
CH3
CH6
CH19
CH12
CH2
CH13
PIP
CH1
CH2
CH3
CH4
CH5
CH6
CH2
CH4
CH5
CH1
CH1
CH4
CH4
CH7
CH1
CH8
CH9
CH1
CH2
CH3
CH1
CH4
CH5
CH7
CH1
CH8
CH1
CH1
CH2
CH7
CH8
CH2
CH5
CH8
CH2
CH2
CH7
CH2
CH5
CH6
CH3
CH6
CH5
CH7
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
7-split mode
CH1
CH2
CH3
CH4
CH5
CH6
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH1
Auto Sequence
CH8
CH4
CH1
CH1
CH1
CH2
CH2
CH5
CH9
CH4
CH6CH5
CH9
CH3
CH7
CH10
CH8
CH14
CH15
CH12
CH1
CH2
CH3
CH5
CH9
CH6
CH7
CH10
CH3
CH2
CH2
CH3
CH11
CH6
CH13
CH14
CH9
CH3
CH16
CH3
CH10
CH11
CH6
CH5
CH1
CH13
CH14
CH9
CH16
CH7
CH3
CH9
CH3
CH4
CH2
CH5
CH13
CH6
CH9
CH7
CH3
CH10
CH13
CH15
CH14
CH4
CH7
CH8
CH5
CH13
CH6 CH8
CH11
CH4
CH9
CH12
CH16
CH12
CH1
CH1
CH2
CH15
CH4
CH5
CH7
CH8
CH12
CH1
CH2
CH15
CH9
CH4
CH5
CH7
CH8
CH8
CH4
CH7
CH5
CH1
CH7
CH10
CH6
CH2
CH2
CH1
CH4
CH9
CH3
CH2
CH1
CH1
CH4
CH10
CH1
CH6
CH6
CH3
CH7
CH13
CH11
CH6
CH3
CH1
CH3
CH2
CH5
CH5
CH1
CH4
CH3
CH2
CH1
CH4
CH4
CH1
CH7
CH15
CH8
CH2
CH4
CH12
CH2
CH15
CH19
CH11
CH1
CH1
CH12
CH7
4-split mode
CH12
CH4
CH7
CH4
CH2
CH4
CH6
CH7
CH4
CH10
CH1
CH6
CH8
CH10
CH4
CH3
CH5
CH2
CH1
CH5
CH4
CH1
CH1
CH6
CH3
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH4
34_ live
CH6
CH1
CH6
CH2
CH8
CH3
CH3
CH3
CH7
CH7
CH2
CH1
CH2
9-split mode
CH1
CH1
CH3
CH7
CH7
CH6
CH1
CH6
CH11
CH12
`CH10
` SDH-P4080/SDH-P4040
do not support the 16-split screen
mode.
CH13
CH14
CH14
CH1
CH9
CH5
CH11
CH3
CH6
CH2
CH4
CH1
CH14
CH8
CH11
CH8
CH4
CH12
CH15
CH16
CH16
CH2
CH3
CH4
CH6
CH1
CH14
CH8
CH2
CH10
CH12
CH9
CH10
CH11
CH12
CH3
CH1
CH2
CH3
CH4
CH1
CH2
CH3
CH1 CH5 CH2 CH6 CH3 CH7 CH4 CH8
CH1
CH2
CH3
CH4
CH2
CH13
CH14
CH15
CH16
CH7 CH5
CH8 CH6
CH9
CH1 CH5 CH2 CH6 CH3 CH7 CH4 CH8
CH1
CH2
CH3
CH9
CH10
CH11
CH12
CH1 CH5 CH2 CH6 CH3 CH7 CH4 CH8
CH1
CH4 CH2
CH5 CH3
CH6
CH1
CH2
CH1 CH5 CH2CH9 CH6 CH3CH10CH7 CH4CH11CH8 CH12 CH1
CH4 CH2
CH5 CH3
CH6
CH1 CH5 CH2CH9 CH6 CH3CH10CH7 CH4CH11CH8 CH12 CH1
CH4 CH2
CH5 CH3
CH6
CH2
CH13
CH14
CH15
CH16
CH7
CH8
CH1 CH5 CH2CH9 CH6 CH3CH10CH7 CH4CH11CH8 CH12 CH1
CH3
CH1CH9
CH4 CH2
CH5 CH3
CH6
CH1 CH5 CH2CH9 CH6 CH3CH10CH7 CH4CH11CH8 CH12 CH1
CH2
CH3
CH13
CH14
CH15 CH1 CH16 CH4CH2 CH7 CH5CH3 CH8 CH6
CH9
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH1
CH2
CH4
CH5
CH6
CH13CH10CH7
CH14CH11CH8CH15CH12
CH9
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH1 CH16 CH4 CH2 CH7CH5 CH3 CH8CH6
CH13CH10CH7
CH14CH11CH8CH15CH12
CH16
CH7
CH8
CH9
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH2
CH1
CH2
CH3
CH7
CH8
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH4
CH5
CH6
CH13CH10 CH4
CH14CH11 CH15CH12
CH9
CH1 CH5 CH2CH9 CH6 CH3
CH1 CH16 CH4 CH2 CH7CH5 CH3 CH8CH6
CH13CH10CH7
CH14CH11CH8CH15CH12
CH9
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH1 CH16 CH4 CH2 CH7CH5 CH3 CH8CH6
CH1
CH2
CH13CH10CH7
CH14CH11CH8CH15CH12
CH9
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH1 CH16
CH2 CH7
CH3 CH8
CH13CH10CH7CH14CH11CH8CH15CH12 CH16 CH4CH2 CH7 CH5CH3 CH8 CH6
CH9
CH2
CH5 CH9 CH6CH13CH10CH7CH14CH11CH8CH15CH12 CH1
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH16 CH4
CH7 CH5
CH8 CH6
CH9
CH5 CH9 CH6CH13CH10CH7CH14CH11CH8CH15CH12 CH16 CH4
CH7 CH5
CH8 CH6
CH9
CH2
CH5 CH9 CH6CH13CH10CH7CH14CH11CH8CH15CH12 CH16 CH4
CH1
CH2
CH7 CH5
CH8 CH6
CH9
CH2
CH4
CH5
CH2
CH3
CH4
CH5
CH9 CH13CH10 CH14CH11 CH15
CH8 CH6
CH9
CH2
CH1CH12 CH16 CH4 CH2 CH7CH5
CH1
CH9 CH13CH10 CH14CH11 CH15
CH2
CH3
CH7
CH4
CH5 CH1 CH6CH3
CH4
CH8 CH6
CH9
CH2 CH3
CH1CH12 CH16
CH2 CH7
CH9 CH13CH10 CH14CH11 CH15
CH12
CH16
CH8
CH9
CH2
CH1
CH2 CH7
CH3
CH1
CH6
CH7
CH13
CH14
CH15
CH16
CH8
CH9
CH2
CH1
CH2 CH7
CH3
CH1
CH2
CH3
CH4
CH5
CH13
CH14
CH15
CH16
CH8
CH9
CH2
CH1
CH2 CH7
CH3
CH1
CH13
CH14
CH15
CH16
CH8
CH9
CH7
CH4
CH5 CH1 CH6CH4 CH2
CH3
CH4
CH5 CH3
CH6
CH2
CH1
CH2 CH7
CH3
CH1
CH2
CH8
CH1
CH19
CH1
CH2
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH6
CH7
CH2
CH1
CH2
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH2
CH3
CH4
CH5
CH2
CH1
CH2
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH1
CH2
CH4 CH2
CH5
CH1
CH2
CH10 CH11CH6
CH12 CH13 CH14 CH15 CH16
CH10
CH11
CH12
CH13
CH7 CH8
CH9 CH3
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH2
CH1
CH2
CH8
CH1
CH19
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH6
CH7
CH2
CH1
CH2
CH3
CH1
CH6
CH7CH2
CH4
CH5
CH3
CH4
CH3
CH4
CH5
CH2
CH1
CH2
CH3
CH1
CH6
CH7
CH4
CH5
CH3
CH4
CH1
CH2
CH1
CH2
CH4 CH2
CH5
CH3
CH10 CH11CH6
CH12 CH13 CH14 CH15 CH16
CH10
CH11
CH12
CH13
CH7 CH8
CH9 CH3
CH6
CH7
CH4
CH5
CH3
CH2 CH4 CH3
CH4CH1
CH5
CH1
CH2
CH8
CH1
CH19
CH3
CH6
CH7
CH4
CH5
CH3
CH2 CH4 CH3
CH4CH1
CH5
CH1
CH2
CH3
CH6
CH7
CH1
CH2
CH3
CH7
CH4
CH5
CH3
CH2 CH4 CH3
CH4CH1
CH5
CH1CH6
CH2
CH3
CH3
CH7
CH4 CH7 CH5
CH3
CH2 CH4
CH4CH1
CH5
CH1CH6
CH2
CH3
CH6 CH3
CH4
CH5
CH6
CH3
CH1
CH10
CH11
CH12
CH13
CH14 CH15 CH16
CH10
CH11
CH12
CH13
CH7
CH8
CH9
CH6
CH7
CH4
CH5
CH3
CH2 CH4
CH3
CH4
CH5
CH1
CH2
CH3
CH6
CH7
CH8
CH1
CH19
CH4 CH7 CH5
CH3
CH2 CH4
CH4
CH5
CH1CH6 CH4 CH7
CH2
CH6 CH3
CH5 CH3
CH6
CH4 CH7 CH5
CH3
CH2 CH4
CH4CH1
CH5
CH1CH6 CH4 CH7
CH2
CH6 CH3CH8
CH5 CH3
CH6
CH6 CH4 CH7
CH4 CH7 CH5 CH19
CH3
CH2 CH4
CH4CH1
CH5
CH2
CH6 CH3CH8
CH5 CH3
CH6
CH19 CH1
CH6
CH7
CH4
CH5
CH3
CH10
CH11
CH12
CH13
CH14
CH15
CH16
CH10
CH11
CH12
CH13
CH7
CH8
CH9
CH2 CH4
CH3
CH4
CH5
CH1
CH2
CH3
CH6 CH8
CH7 CH19
CH4
CH5
CH6
CH1
CH2 CH6 CH3CH8
CH4
CH5
CH1
CH4 CH2
CH5CH9CH3
CH6
CH12 CH13 CH14 CH15 CH16
CH10CH1 CH5
CH11 CH7CH12CH19
CH8
CH2 CH6 CH3CH8
CH4
CH1 CH13 CH4 CH2 CH7CH5
CH3 CH10 CH11
CH6
CH12 CH13 CH14 CH15 CH16
CH10CH1 CH5
CH11 CH7CH12CH19
CH8 CH9
CH2 CH6 CH3CH8
CH4
CH1 CH13 CH4 CH2 CH7CH5
CH3 CH10 CH11
CH2
CH6
CH10
CH11
CH12
CH13
CH14
CH15
CH16
CH10CH1 CH5
CH11 CH7CH12CH19
CH13
CH7
CH8
CH9
CH2 CH6 CH3CH8
CH4
CH1
CH1
CH1
CH1
CH4 CH2
CH5CH9CH3
CH6
CH12 CH13 CH14 CH15 CH16
CH10CH1 CH5
CH11 CH7CH12CH19
CH8
CH2 CH6 CH3CH8
CH4
CH1 CH13 CH4 CH2 CH7CH5
CH3 CH10 CH11
CH6
CH12 CH13 CH14 CH15 CH16
CH10CH1 CH5
CH11 CH7CH12CH19
CH8 CH9
CH2 CH6 CH3CH8
CH4
CH1 CH13 CH4 CH2 CH7CH5
CH3 CH10 CH11
CH6
CH10CH1 CH5
CH11 CH7CH12CH19
CH8 CH9
CH2 CH6 CH3CH8
CH4
CH1 CH13
CH2 CH7CH5
CH3 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH2
CH12 CH13 CH14 CH15 CH16
CH10CH1 CH11 CH7CH12CH19 CH13 CH4CH2 CH7 CH8
CH9 CH10 CH11CH6
CH6 CH8 CH10CH1 CH11 CH7CH12CH19 CH1
CH5CH9CH3
CH1
CH1
CH1
CH10 CH11CH6
CH12 CH13 CH14 CH15 CH16
CH13 CH4
CH7 CH8
CH6 CH8 CH10CH1 CH11 CH7CH12CH19 CH13 CH4
CH5CH9 CH10 CH11CH6
CH12 CH13 CH14 CH15 CH16
CH7 CH8
CH6 CH8 CH10CH1 CH11 CH7CH12CH19 CH13 CH4
CH5CH9 CH10 CH11CH6
CH12 CH13 CH14 CH15 CH16
CH7 CH8
CH5CH9 CH10 CH11CH6
CH8 CH10CH1 CH11
CH2
CH12 CH13 CH14 CH15 CH16
CH12CH19 CH13 CH4
CH7 CH8
CH5CH9 CH10 CH11CH6
CH8 CH10CH1 CH11
CH1
CH2
CH3CH1
CH1
CH1
CH12 CH13 CH14 CH15 CH16
CH12CH19 CH13 CH4
CH7 CH8
CH8 CH10CH1 CH11
CH12CH19 CH13
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH1
CH2
CH1
CH10
CH11
CH12
CH13
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH10
CH11
CH12
CH13
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH2
CH1
CH10
CH11
CH12
CH13
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH1
CH1
CH4 CH2
CH5 CH3CH1 CH6
CH2
CH2
CH1
CH1
CH1
CH1
CH2
CH1
CH2
CH1
CH1
CH1
CH2
CH1
CH1
CH1
CH1
CH2
CH3
CH4
CH3
CH4
CH8 CH6
CH9
CH2
CH1
CH1
CH1 CH7 CH5
CH2
CH1
CH1
CH1
CH1
CH2
CH1
CH2
CH2
CH1
CH1
CH1
CH2
CH1
CH1
CH1CH2
CH1
CH4
CH3
CH4
CH7 CH5 CH3
CH8 CH6
CH9
CH2
CH1
CH1
CH1
CH1
CH1
CH1
CH1 CH2
CH2
CH3
CH1
CH2
CH1
CH2
CH1
CH1
CH1
CH1 CH2
CH2
CH3
CH1
CH1
CH1
CH1 CH2
CH2
CH3
CH1
CH2
CH1
CH2
CH4
CH1 CH6
CH3CH3
CH10 CH4
CH11
CH12
CH1
CH7 CH5
CH8
CH9CH2 CH2
CH1
CH1
CH1 CH2
CH2
CH3
CH1
CH2 CH1
CH1
CH1
CH1 CH6
CH1 CH2 CH4 CH2
CH1
CH2 CH1
CH1
CH2
CH5 CH3
CH1
CH1 CH6
CH1 CH2 CH4 CH2
CH1
CH2 CH1
CH1
CH2
CH5 CH3
CH1
CH1 CH6
CH1 CH2 CH4 CH2
CH1
CH2 CH1
CH1
CH2
CH5 CH3
CH1
CH10 CH4CH13 CH11
CH1
CH1
CH1 CH6
CH7
CH8
CH4 CH9CH2 CH2 CH5 CH3CH3 CH6
CH14 CH12
CH15
CH4 CH2
CH1
CH1
CH2 CH1
CH1
CH4 CH2
CH5 CH3
CH1
CH2
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH3
CH4
CH9 CH1
CH1
CH2
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH3
CH4
CH9 CH1
CH1
CH2
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH3
CH4
CH9 CH1
CH1
CH1
CH4 CH2
CH13 CH11
CH15
CH4 CH2
CH2
CH1CH1
CH2 CH5 CH3
CH7
CH8 CH6
CH9CH10
CH16 CH14 CH12
CH7 CH5
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH3
CH4
CH9 CH1
CH1
CH2
CH3
CH2
CH1
CH2
CH4
CH3
CH4
CH7 CH5
CH8 CH6
CH9 CH1
CH1
CH2
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH3
CH4
CH9 CH1
CH1
CH2
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH3
CH4
CH9 CH1
CH1
CH1
CH2
CH1 CH1
CH2 CH5 CH3
CH4 CH2
CH13 CH11
CH15
CH4 CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH7
CH8 CH6
CH9CH10
CH16 CH14 CH12
CH7 CH5 CH3
CH8
CH3
CH4
CH9 CH1
CH2
CH1
CH2
CH4
CH6
CH3
CH7 CH5
CH8 CH1
CH9 CH2CH1
CH3
CH10CH4
CH11
CH12 CH2
CH1
CH2
CH3
CH1
CH2
CH1
CH4
CH5
CH6
CH3
CH7
CH8 CH1
CH9 CH2
CH3
CH10CH4
CH11
CH12
CH1
CH2
CH3
CH4
CH6
CH3
CH7 CH5
CH8 CH1
CH9 CH2
CH3
CH10CH4
CH11
CH12
CH1
CH2
CH3
CH1CH15
CH2
CH4
CH6
CH4
CH13
CH4
CH7 CH5 CH1 CH8 CH6 CH2 CH9
CH16 CH14
CH7 CH5
CH8 CH6
CH3
CH7 CH5
CH8 CH1
CH9 CH2
CH3
CH10CH4
CH11
CH12
CH3
CH1
CH2
CH3 CH6
CH7
CH8 CH1
CH9 CH2
CH10CH4 CH13 CH11
CH1
CH1
CH2
CH4
CH5 CH3
CH14 CH12
CH15
CH4 CH2
CH5 CH3
CH6
CH1CH2
CH9
CH3 CH6
CH7
CH8 CH1
CH9 CH2
CH10CH4 CH13 CH11
CH1
CH1 CH5
CH2 CH6
CH4
CH5 CH3
CH14 CH12
CH15
CH4
CH5 CH3 CH2 CH6
CH3 CH6
CH7
CH8 CH1
CH9 CH2
CH10CH4 CH13 CH11
CH1
CH1
CH2
CH4
CH5 CH3
CH14 CH12
CH15
CH4 CH2
CH5 CH3
CH6
CH3 CH6
CH7
CH8 CH1
CH9 CH2
CH7
CH16
CH7
CH8
CH9
CH10CH4 CH13 CH11
CH1 CH8 CH4 CH2 CH9 CH5 CH3
CH1
CH2
CH4
CH5 CH3
CH14 CH12
CH15
CH6
CH1
CH10
CH11
CH12
CH1
CH2
CH3
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13
CH14
CH15
CH4
CH5
CH6
CH9
CH16
CH3
CH4
CH7
CH8
CH9
CH2
CH5
CH6
CH9
CH1
CH10
CH1
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13 CH11CH16 CH14 CH12
CH15
CH4CH1CH2CH7 CH5 CH3 CH8
CH6
CH9
CH3
CH4
CH9
CH1
CH10
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13 CH11CH16 CH14 CH12
CH15
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH9
CH3
CH4
CH9 CH1
CH1
CH2
CH3
CH10
CH11
CH12
CH1
CH2
CH3
CH1
CH2
CH11
CH3
CH4
CH4
CH13
CH15
CH4
CH7 CH5
CH8 CH6
CH9
CH16 CH14
CH3 CH7
CH4 CH8
CH7 CH5
CH8 CH6
CH9
CH1
CH10
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13 CH11CH16 CH14 CH12
CH15
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH9
CH3
CH4
CH9 CH1 CH5
CH1
CH10
CH1
CH2
CH3 CH2 CH6
CH6 CH4
CH9
CH10
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13 CH11CH16 CH14 CH12
CH15
CH4CH1
CH9
CH3
CH7 CH5
CH8
CH9 CH1
CH1
CH10
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13 CH11CH16 CH14 CH12
CH15
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH9
CH3
CH4
CH9 CH1
CH1
CH10
CH1
CH2
CH4 CH2CH7 CH5 CH3 CH8 CH6
CH13 CH11CH16 CH14 CH12
CH15
CH4 CH2CH7 CH5
CH7
CH8
CH11
CH3CH3 CH8 CH6
CH4 CH1
CH9
CH3
CH4
CH9
CH1
CH2
CH4
CH5
CH6
CH13
CH14
CH15
CH4
CH5
CH6
CH7
CH8
CH9
CH16
CH3
CH4
CH7
CH8
CH9
CH2
CH2CH6
CH5 CH3
CH6 CH4
CH9
CH10
CH4
CH13
CH15
CH4 CH1 CH7 CH5
CH7 CH5
CH8 CH6
CH9
CH16 CH14
CH8
CH9 CH1
CH4
CH13
CH15
CH4
CH3 CH3 CH4
CH7
CH2
CH3
CH4
CH7 CH5
CH8 CH6CH1 CH9
CH16 CH14
CH4
CH7 CH5
CH8 CH6CH1 CH9 CH2
CH10
CH13
CH14
CH4
CH13 CH2CH16 CH14
CH15 CH5
CH4 CH6CH7 CH5CH3 CH8 CH6 CH9 CH9
CH7
CH11
CH12
CH4
CH7 CH5
CH8 CH6CH1 CH9
CH4
CH2
CH5
CH6
CH9
CH10 CH3
CH13 CH8
CH14
CH7
CH8
CH4
CH8
CH1 CH9
CH2 CH16
CH5
CH6 CH7
CH9 CH9
CH10 CH3
CH13
CH14
CH5
CH6 CH10 CH3
CH7
CH8
CH6 CH14 CH1
CH8
CH7
CH8
CH4
CH8
CH1 CH9
CH2 CH16
CH5
CH6 CH7
CH9 CH9
CH13 CH5
CH1 CH9 CH2
CH3 CH3 CH4
CH7
CH2
CH3
CH4
CH7
CH8
CH4
CH8
CH1 CH9
CH2 CH16
CH5
CH6 CH7
CH9
CH10
CH13
CH14
CH7
CH8
CH4
CH7
CH11
CH12
CH3 CH8
CH4
CH1 CH9
CH2 CH16
CH5
CH6 CH7
CH9 CH9
CH10 CH3
CH13 CH8
CH14
CH9
CH10
CH11
CH12
CH9
CH10
CH11
CH12
CH1
CH2
CH5
CH6
CH9
CH10
CH13
CH14
CH7
CH8
CH11
CH12
CH15
CH16
CH3
CH4
CH5
CH6CH10 CH7
CH8
CH1
CH2
CH5
CH6
CH9
CH13 CH5 CH15CH6CH14 CH1 CH16CH8
CH7
CH8
CH3
CH4
CH1
CH2 CH11 CH10
CH3
CH4 CH12
CH7
CH2
CH3
CH4
CH1
CH2
CH5
CH6
CH9
CH13
CH14
CH7
CH8
CH11
CH12
CH15
CH16
CH3
CH4
CH1
CH2
CH5
CH6
CH9
CH10
CH14
CH14CH12 CH15 CH13CH16
CH14CH16 CH15
CH16
CH3
CH7
CH8
CH11 CH13
CH15 CH13
CH3
CH4
CH1
CH2
CH5
CH6
CH9
CH10
CH13
CH14
CH9
CH10
CH11
CH12
CH9
CH10
CH11
CH12
CH7
CH8
CH11
CH12
CH15
CH16
CH3
CH4
CH5
CH6
CH7
CH8
CH5
CH6
CH1
CH8
CH1
CH2
CH5
CH6
CH9
CH10
CH13
CH14
CH7
CH8
CH3
CH4
CH1
CH2CH11 CH10
CH3
CH4CH12
CH7
CH2CH15 CH14
CH3
CH4CH16
CH1
CH2
CH5
CH6
CH9
CH13
CH7
CH8
CH11
CH12
CH15
CH16
CH3
CH4
CH1
CH2
CH5
CH6
CH9
CH10
CH14
CH14
CH14CH16 CH15
CH16
CH3
CH7
CH11 CH13
CH12 CH15 CH13CH16
CH15 CH13
CH3
CH1 CH4 CH2
CH3
CH4
CH7 CH8 CH2
CH3
CH4
CH1
CH2
CH5
CH6
CH9
CH13
CH9 CH10CH10
CH11
CH12
CH9 CH14CH10
CH11
CH12
CH7
CH11
CH12
CH15
CH16
CH3
CH1 CH4 CH2
CH3
CH4
CH7 CH8 CH2
CH3 CH5 CH4
CH7 CH12 CH8
CH5 CH15 CH6
CH1 CH16 CH8
CH1
CH2
CH5
CH6
CH9
CH10
CH13
CH14
CH7
CH11 CH6
CH3
CH1 CH4 CH2
CH3
CH4
CH7 CH8 CH2
CH3
CH4
CH7 CH8
CH11 CH8
CH12
CH15
CH16
CH3
CH1 CH4
CH7 CH8
CH5 CH2 CH6 CH3 CH7 CH4
CH5 CH2 CH6 CH3 CH1 CH4
CH13
CH14
CH15
CH16
CH13
CH14
CH16
CH3
CH7 CH8
CH11 CH8
CH12
CH15
CH16 CH15
CH3
CH1 CH4
CH7 CH8
CH5 CH2 CH6 CH3 CH7 CH4
CH5 CH2 CH6 CH3 CH1 CH4
CH9 CH8 CH10
CH11
CH12
CH9
CH10
CH11
CH12
CH7 CH8
CH11
CH12
CH15
CH16
CH3
CH1 CH4
CH7 CH8
CH5 CH2 CH6 CH3 CH7 CH4
CH5 CH2 CH6 CH3 CH1 CH4
CH7 CH8
CH11 CH8
CH12
CH15
CH16
CH3
CH1 CH4
CH7 CH8
CH5 CH2CH9 CH6 CH3CH10CH7 CH4
CH5 CH2CH9 CH6 CH3CH10CH1 CH4
CH12
CH12 CH12
CH7 CH11
CH11CH11
CH15
CH16
CH3
CH1 CH4
CH7 CH8
CH5 CH2CH9 CH6 CH3CH10CH7 CH4
CH5 CH2CH9 CH6 CH3CH10CH1 CH4
CH11CH8 CH12
CH11CH8
CH12CH14
CH7
CH8
CH11
CH12
CH15
CH16
CH3
CH4
CH13
CH15
CH16
CH13
CH14
CH15
CH16
CH3
CH1 CH5 CH2CH9 CH6 CH3CH10CH7 CH4CH11CH8 CH12
CH7 CH5 CH2CH9 CH6 CH3CH10CH1 CH4CH11CH8 CH12
CH1 CH5 CH2CH9 CH6 CH3CH10CH7 CH4CH11CH8 CH12
CH7 CH5 CH2CH9 CH6 CH3CH10CH1 CH4CH11CH8 CH12
CH13
CH14
CH15 CH7 CH16
CH13
CH14
CH15
CH16
CH3
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH3
CH4
CH5 CH2CH9 CH6CH13
CH10CH1CH14
CH11CH8CH15CH12 CH16
CH13CH10CH7
CH14CH11CH8CH15CH12
CH3
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH7 CH16
CH3CH10CH1 CH4
CH5 CH2CH9 CH6CH13
CH13CH10CH7
CH14CH11CH8CH15CH12
CH14CH11CH8CH15CH12 CH16
CH3
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH7 CH16
CH3CH10CH1 CH4
CH5 CH2CH9 CH6CH13
CH13CH10CH7
CH14CH11CH8CH15CH12
CH16
CH14CH11CH8CH15CH12 CH16
CH3
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH7
CH2
CH3CH10CH1 CH4
CH7
CH8
CH5
CH9 CH6CH13
CH13CH10 CH4
CH14CH11 CH15CH12
CH14CH11CH8CH15CH12 CH16
CH3
CH1 CH5 CH2CH9 CH6 CH3
CH7 CH16
CH2CH9 CH6 CH3
CH4
CH7
CH8
CH5
CH1
CH8
CH10
CH11
CH12
CH10
CH11
CH12
CH13
CH14
CH15 CH7 CH16 CH2
CH13
CH14
CH15
CH16
CH3
CH1 CH5 CH2CH9 CH6 CH3
CH4
CH3
CH4
CH5 CH9 CH6CH13
CH10CH1CH14
CH11CH8CH15CH12 CH16
CH13CH10CH7CH14CH11CH8CH15CH12 CH16
CH3
CH5 CH9 CH6CH13CH10CH7CH14CH11CH8CH15CH12 CH16
CH5 CH9 CH6CH13CH10CH1CH14CH11CH8CH15CH12 CH16
CH3
CH5 CH9 CH6CH13CH10CH7CH14CH11CH8CH15CH12 CH16
CH5 CH9 CH6CH13CH10CH1CH14CH11CH8CH15CH12 CH16
CH3
CH5 CH9 CH6CH13CH10CH7CH14CH11CH8CH15CH12 CH16
CH5 CH9 CH6CH13CH10CH1CH14CH11CH8CH15CH12 CH16
CH3
CH9 CH13CH10 CH14CH11 CH15CH12 CH16
CH9 CH13CH10 CH14CH11 CH15CH12 CH16
CH3
CH9 CH13CH10 CH14CH11 CH15CH12 CH16
CH9 CH13CH10 CH14CH11 CH15CH12 CH16
CH3
CH9 CH13CH10 CH14CH11 CH15CH12 CH16
CH9 CH13CH10 CH14CH11 CH15CH12 CH16
CH3
CH13
CH14
CH15
CH16
CH13
CH14
CH15
CH16
CH3
CH13
CH14
CH15
CH16
CH13
CH14
CH15
CH16
CH3
CH13
CH14
CH15
CH16
CH13
CH14
CH15
CH16
CH3
CH9
CH13
CH13
CH10
CH14
CH11
CH15
CH12
CH14
CH15
CH16
CH16
CH4
CH7
CH7
CH8
CH5
CH8
CH2
CH1
CH1
CH2
CH3
CH4
CH1
CH4
CH5
SDH-P5080/SDH-V5100/SDH-V5120 display 16 Live images in the sequence of Single, 4-split and 9-split
modes.
CH3
MM
1
4-split mode
CH3
CH6
CH3
CH2
CH6
CH8
CH10
CH4
CH4
CH8
CH1
CH10
CH1
CH11
CH11
CH5
CH19
CH7
CH12
CH19
CH13
CH2
CH1
CH4
CH4
CH12 CH13 CH14 CH15 CH16
CH7 CH8
CH9 CH10 CH11CH6
CH5
CH5
CH2
CH2
CH2
CH4
CH3
CH7
CH5
CH5
CH3
CH7
CH6
CH6
CH9
CH3
CH6
CH8
CH6
CH9
CH1
CH1
CH6
CH9
CH1
CH1
CH9
CH8
CH1
CH2
CH3
CH2
CH4
CH2
CH3
CH5
CH5
CH2
CH3
1-9
CH3
CH9
CH2
CH3
CH4 CH3 CH7
CH1
CH2
10-16
CH1
CH2
9-split mode
CH1
CH6
CH3
CH5
CH1
CH3
CH8
CH3
CH1
CH1
CH4
CH3
CH1
CH2
CH1
CH7
CH2
CH1
CH2
CH2
CH1
CH7
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH13
CH1
CH2
CH3
CH6CH3
CH7
CH5
CH12
CH6
CH5
CH1
CH2
●● live
Single mode
CH4
CH4
CH2
Auto Sequence
13-16
9-12
5-8
1-4
CH9
CH2
CH1
Switching the split mode
16
CH6
CH9
CH9
CH1
CH4
CH4
CH10
CH11
CH10
CH13 CH11
CH14 CH12
CH13
CH16 CH14
CH15
CH4
CH3 CH4CH6
CH8CH4CH6
CH2
CH1
CH12
CH15
`` In Single mode, If you have set <SEQ-Dwell Time> in “Setting the Device > Camera”, Auto Sequence will be conducted
at the set interval. (Page 50)
CH10
CH13
CH3 CH7
CH9
CH16
CH13
CH12
CH16
`` In a split mode, If you have set <Multi CH SEQ Time> in “Setting the Device > Monitor”, Auto Sequence will be
conducted at the set interval. (Page 58)
CH12
CH13CH1
CH15
CH15CH3
CH15CH3
CH1
CH5
CH9
CH13
CH14CH2
CH14CH2
CH16
CH16CH4
CH16CH4
CH3
CH4
CH5
CH2
CH6
CH3
CH7
CH4
CH8
CH13
CH10
CH14
CH11
CH15
CH12
CH16
CH14
CH15
CH7
CH7
CH2
CH10
CH7
CH5
CH5
CH1
CH9
CH6
CH4
CH4
CH7
CH7
CH2
CH5
CH8
CH14
CH15
CH13CH1
CH1
CH14
CH8CH4
CH10
CH1
CH11
CH8
CH16
CH12
CH7
CH5
CH9
CH13
CH6
CH6
CH9
CH9
CH8
CH8
CH11
CH7
CH2
CH3
CH4
CH5
CH2
CH6
CH3
CH1
CH4
CH8
CH13
CH10
CH14
CH11
CH15
CH12
CH16
CH9
CH6
CH14
CH10
CH1
CH15
CH11
CH11
CH8
CH16
English _35
CH12
CH3
CH3
CH3
CH10
CH3
CH4
CH3
CH4 CH4
CH4
CH3
CH11CH10 CH12CH11 CH13CH12
CH6
CH5
CH4
CH4
CH4 CH5
CH7
CH6
CH5
CH4
CH7
CH6
CH5
CH7
CH6
CH7
CH11
CH12
CH13
CH10
CH14
CH11
CH15
CH12
CH16
CH13 CH14 CH15 CH16
CH13
CH7 CH8 CH9 CH10
CH7
CH8
CH9
CH2
CH2
CH3
CH4
CH6 CH3
CH4
CH5
CH7
CH1
CH2
CH2
CH3
CH2
CH4
CH3
CH2
CH5
CH4
CH3
CH2
CH5
CH4
CH3
CH6
CH6
CH6
CH7
CH6
CH7
CH8
CH1
CH8
CH1
CH8
CH19
CH1
CH8
CH19
CH1
CH10
CH11
CH10
CH12
CH11
CH10
CH13
CH12
CH11
CH10
CH10CH8
CH11
CH12
CH10
CH13
CH11
CH14
CH12
CH15
CH10
CH13
CH16
CH11
CH14
CH12
CH15
CH10
CH13
CH16
CH11
CH14CH12
CH15CH13
CH16CH14 CH15 CH16
CH13
CH12
CH11
CH13
CH12
CH13
CH7 CH8
CH9CH7
CH9
CH7
CH8
CH9
CH7
CH8
CH9
CH1
CH2
CH1
CH1
CH1
CH5
CH1
CH2
CH6
CH8
CH4
CH19
CH10CH1
CH4
CH7
CH19
CH12CH19 CH13
CH11
CH4CH5
CH4CH5CH6 CH4CH5CH6
CH19
CH11
CH12
CH1
CH4
CH3
CH3
CH1
CH7
CH10
CH2
CH2
CH8
CH7
Manual Switching
CH1
CH5
CH1CH2CH3 CH1CH2
CH6 CH1CH2
CH7CH3
CH1
CH2
live
CH5
CH4
CH5
CH4
CH1
CH6
CH1
CH3
CH2
CH1
CH3
CH2
CH3
CH4
CH4
CH5
CH6
CH5
CH6
CH7
CH8
CH2
CH2
CH3
CH9
CH10
CH11
CH12CH1
CH1
CH2
CH3
CH4
CH4
CH5
CH6
CH6
CH7
CH8
CH2
CH1
CH2
CH3
CH9
CH10
CH11
CH12
CH13CH3
CH15
CH16
CH7
CH8
CH9
CH1
CH2
CH1
CH2 CH14
CH3 CH1
CH4
CH5
CH6
CH5
CH6
CH7
CH8
CH9
CH10
CH11
CH12
CH13
CH14
CH7
CH8
CH9
CH2
CH2 CH15 CH2 CH16CH1
CH2
CH2
CH4CH2
CH5CH1
CH6
CH1
CH1
CH1
CH1
CH1
CH1
CH1
CH9
CH10
CH11
CH12 CH1
CH13
CH14
CH15
CH16
CH7
CH8
CH9
CH1
CH2
CH3
CH5
CH4
CH6
CH5
CH6
CH1
CH6
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH2
CH1
CH5
CH5
CH6
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH5CH6
CH13
CH1
CH8
CH4 CH3
CH2CH3
CH3
CH3
CH1
CH1
CH1 key to move to the next split
CH1 the left/right button on the remote control, or click the arrow <_/+>
Press
CH1
CH1 CH2
CH2
mode.
CH1
CH1
CH1
CH1
CH4
CH5
• If pressing the right [+] button in 9-split mode : CH2
CH2
CH3
CH4
CH4  Auto Sequence
CH7
CH8
CH7 1~9) CH9
CH8
9-split
(CH
mode
CH99-split
(CHCH3
10~16)
mode
CH3
CH1
CH13
CH14
CH15
CH16
CH1
CH1
CH1CH2CH3 CH1CH2CH3CH2
CH1
CH1CH2
CH1
CH4
CH1
CH7
CH2
CH3
CH4CH5CH6CH2CH4CH5CH6
CH3
CH4
CH4
CH1CH5
CH2
CH1
CH3
CH2
CH4
CH7CH8CH3 CH7CH8CH9 CH7CH8
CH9
CH2
CH4
CH1
CH7
CH4
CH2CH3 CH4
CH1
CH4
CH7
CH5CH6
CH1
CH2
CH1
CH1
CH6
CH4
CH6
CH6
CH8
CH5
CH9
CH6
CH3
CH5
CH11
CH10
;
CH3
CH2 CH1
CH6
CH3
CH12
CH11
CH7
CH5 CH2 CH6
CH4
CH3
CH4
CH3
CH5
CH4
CH1
CH1
CH2
CH1
CH2
CH9
CH2
CH1CH2
CH8 CH4
CH1
CH4
CH9
CH3
CH5
CH5
CH3
CH7
CH1
CH3 CH10 CH4
CH3CH1
CH9
CH3CH9
CH8
CH3
CH8
CH2
CH4
CH3
CH2 CH1
CH2
CH1
CH7
CH3
CH7
CH4
CH2
CH1
CH4
CH12 CH1
CH3 CH4
CH1
CH2
CH4CH10
CH11
CH2
CH1
CH2
CH2
CH3
CH2
CH12
;
CH2
CH1
CH2
CH6
CH7
CH5
CH3
CH2 CH1
CH3 CH2
CH10
CH11
CH12
CH3
CH4
CH5 CH13 CH4
CH5
CH6
CH13 CH4
CH14
CH5
CH4 CH2 CH6 CH6
CH5
CH6
CH14
CH13
CH15
CH14
CH15
CH5
CH4 CH15
CH7
CH1
CH2
CH3
CH2
CH3
CH4
CH5
CH6
CH5 CH4
CH6 CH5
CH13
CH14
CH15
CH6
CH7 CH4 CH1
CH2
CH3
CH8
CH1
CH19 CH7
CH8
CH9
CH16
CH1CH12
CH1CH12
CH2
CH1CH2CH3 CH1CH2CH3
CH1
CH1CH2CH3CH4CH1CH2CH3
CH2
CH10
CH3
CH10
CH3
CH11 CH4 CH10
CH11
CH12CH5
CH10
CH11
CH12 CH6CH11
CH2CH2
CH3
CH5
CH6
CH7CH9 CH16
CH8
CH7
CH9
CH8
CH7
CH8
CH7
CH2CH16
CH3
CH8
CH1
CH19CH1
CH10 CH11 CH12 CH13 CH14
CH10
CH11
CH12
CH13
CH7
CH8 CH7 CH8 CH9
CH9
CH16CH15 CH16
CH4
CH5
CH6
CH6
CH7
CH1
CH4CH5CH8 CH4
CH5
CH6 CH11
CH4CH5CH6CH12 CH19
CH5
CH13
CH6
CH13
CH6
CH14CH7 CH13
CH15
CH15
CH14
CH15
CH4
CH5
CH4CH5CH6 CH4CH5CH6
CH10 CH13
CH11CH14
CH12
CH13 CH14
CH15
CH16 CH4CH15
CH10
CH13
CH8CH14
CH9
CH4
CH5
CH6
CH8
CH1
CH19
CH10
CH11
CH12
CH13
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH3
CH4
CH7
CH1
CH2
CH3
CH1
CH2
CH1
CH6
CH5 CH4
CH4
CH6CH5
CH5
CH7
CH2CH3
CH9
CH8
CH7
CH1
CH1
CH2
CH3
CH8
CH3
CH3
CH6
CH9 CH3
CH8
CH1
CH5CH6
CH2
CH1CH9
CH1
CH6
CH2 CH1
CH2
CH1
CH9
CH2
CH1
10-16
CH4
CH2
CH2
1-9
CH3
CH6
CH3
CH3
CH4
CH14 CH15 CH16
CH7 CH8CH1
CH9 CH10 CH11 CH12 CH13CH2
CH1
CH3
CH1
CH1
CH2
CH1
CH2
CH1
CH3 CH1
CH4
CH1
CH3
CH2
CH1 CH4
CH3
CH4
CH3
CH1
CH2 CH1
CH1
CH2CH4 CH7
CH2
CH3 CH2
;
CH2CH5
CH2
CH4
CH2
CH4 CH3
CH4
CH2
CH5
CH3
CH3
CH5
CH6
CH2 CH5
CH6
CH5
CH1
CH1
CH1
CH7
CH7
CH6
CH5
CH6 CH9
CH8
CH2
CH3
CH4
CH1
CH1 CH5 CH2 CH6 CH3 CH7 CH4
CH3
CH8
CH7
CH8
CH7
CH4 CH7
CH5
CH4
CH7
CH6
CH9
CH6
CH6
CH9
CH4
CH1CH4
CH3
CH7
CH5
CH5
CH6
CH3
CH2
CH2
CH1
CH2
CH5
CH7
;
CH7
CH1
CH1
CH11
CH10
CH9
CH10
CH9
CH4
CH7
CH1
CH5 CH2
CH6 CH3
CH1 CH4
CH8
CH5
CH9 CH6
CH1CH1
CH10
CH11CH8
CH2
CH12
CH1
CH2
CH13CH10 CH14CH11 CH15CH12 CH16
CH9
CH1
CH2
CH13CH10 CH14CH11 CH15CH12 CH16
CH2 CH7
CH11CH8
CH3 CH2
CH8 CH11
CH8 CH11
CH4 CH3
CH12
CH11
CH4
CH12
CH11
CH10CH13
CH12CH15
CH12CH15
CH4
CH5
CH6
CH1 CH6 CH5
CH2 CH6
CH1CH8
CH2
CH6 CH5CH3
CH7
CH8 CH7
CH8
CH5CH7
CH1
CH8
CH1 CH4
CH2 CH6
CH2
CH1
CH3
CH2
CH1 CH3 CH8
CH4
CH3
CH2CH7 CH9
CH4
CH3 CH2
CH4CH3
CH2
CH7
CH4
CH3
CH2
CH7
CH4
CH3
CH2
CH3
CH4
CH7 CH4
CH13
CH14 CH3CH15
CH16 CH4
CH13
CH14
CH15
CH16
CH5
CH1
CH2
CH1
CH5
CH9
CH7
CH8
CH9 CH12
CH6
CH5
CH6
CH5
CH8
CH7
CH6
CH5
CH8
CH7
CH6CH5
CH8
CH7
CH5
CH10CH9CH7
CH11
CH12
CH9CH6
CH4
CH5 CH10
CH6 CH11
CH3
CH8
CH1
CH6
CH5
CH10
CH9
CH9
CH13
CH10
CH9
CH10
CH9
CH12
CH11
CH10
CH9CH16CH15
CH12
CH11
CH10CH9 CH16
CH12
CH11
CH10
CH9
CH14CH13CH11
CH15CH14
CH13
CH12
CH11
CH10
CH9
CH12
CH11
CH10
CH9CH14 CH12
CH11
CH10CH15 CH12
CH11 CH16
CH14
CH13 CH15
CH16
CH3CH12
CH13
CH14
CH13
CH4
CH5
CH6
CH7
CH8
CH9
CH7
CH8 CH1
CH15
CH14
CH13
CH1
CH1
CH1
CH4
CH4
CH7
CH7
CH4
CH2
CH7
CH5
CH2
CH4
CH2
CH7
CH5
CH8
CH5
CH3
CH8
CH6
CH5
CH3
CH8
CH6
CH5
CH9
CH13
CH10
CH10
CH9
CH9
CH13
CH9
CH13
CH16
CH3
CH2
CH2
CH13
CH11
CH11
CH12
CH16
CH15
CH14CH3
CH14
CH12
CH12
CH16
CH14
CH2
CH15
CH4
CH5
CH5
CH4
CH5
CH6
CH3
CH3
CH7
CH7
CH7
CH7
CH6
CH7
CH8
CH7
CH8
CH5
CH4
CH2
CH7
CH5
CH6
CH2
CH4
CH2
CH7
CH5
CH8
CH8
CH9
CH8
CH9
CH3
CH3
CH14
CH11
CH12
CH14
CH15
CH16
CH15
CH16
CH9
CH13
CH13
CH10
CH14
CH11
CH1
CH16
CH8
CH6
CH11
CH10
CH4
CH12
CH8
CH3
CH3
CH3
CH3
CH15
CH14
CH13
CH14
CH13
CH16
CH15
CH16
CH15
CH15
CH6
CH9
CH1
CH6
CH15
CH16
CH14
CH14
CH16
CH16
CH15 CH16
CH16
CH16
CH9
CH1
CH2
CH1
CH1
CH3
CH2
CH3
CH2
CH3
CH2
CH4
CH10
CH13
CH14
CH13
CH12
CH4
CH4
CH4
CH3
CH12
;
CH14
CH3
CH3
CH9
CH10
CH12
CH13
CH13
CH15
CH14
CH15
CH14
CH15
CH15
CH14
CH16
CH16
CH16
CH16
CH14
CH14
CH13 CH14
CH3
CH12
CH4
CH11
CH11
CH12
CH14
CH15
CH16
CH15
CH8
CH6
CH5
CH3
CH12
CH10
CH5
CH10
CH5
CH3
CH3
CH9
CH11
CH6
CH2
CH9
CH8
CH2
CH3
CH2
CH9
CH2
CH3
CH4
CH7
CH2
CH3
CH4
CH6
CH7
CH8
CH5
CH6
CH1
CH8
CH9
CH10
CH11
CH12
CH9
CH10
CH11
CH12
CH2
CH3
CH4
CH7
CH2
CH3
CH4
CH5
CH6
CH7
CH8
CH5
CH6
CH1
CH8
CH9
CH10
CH11
CH12
CH9
CH10
CH11
CH12
CH13
CH14
CH15
CH16
CH13
CH14
CH15
CH16
CH6
CH7
CH8
CH5
CH6
CH1
CH8
CH9
CH10
CH11
CH12
CH9
CH10
CH11
CH12
CH13
CH14
CH15
CH16
CH13
CH14
CH15
CH16
CH13
CH1
CH13
CH13
CH3
CH2
CH16 CH3
CH1
CH6
CH8
CH4
CH7
CH4
CH4
CH6
CH7
CH2
CH1
CH1
CH7
CH5
CH4
CH16
CH15CH3
CH15
CH16
CH4
CH5
CH11
CH16
CH15
CH14
CH13
CH13
CH14
CH15
CH11
CH12
CH16
CH14
CH15
CH2
CH1
CH4
CH1
CH1
CH6
CH6
CH1
CH4 CH8
CH8
CH1
CH6
CH5CH10
CH1
CH6 CH11 CH8
CH1 CH12CH8
CH11
CH12
CH4
CH4
CH10
CH10
CH2
CH3
CH3
CH1
CH3
CH9
CH1
CH3
CH3
CH3
CH2
CH16
CH15
CH14CH13 CH16
CH15CH14
CH13 CH16CH15
CH14
CH13
CH1
CH1
CH3
CH9 CH2
CH16
CH15
CH14
CH13
CH8
CH1
CH1
CH13
CH10
CH12
CH10CH13
CH11 CH12
CH3
CH2
CH12
CH1CH7
CH10
CH10
CH10
CH11
CH8
CH9 CH6
CH9
CH11
CH2
CH1
36_ live
CH10
CH8
CH1CH8
CH6 CH9
CH8
CH9
CH9
;
CH1
CH1
CH3
CH1
CH2
CH4
CH4
• IfCH7pressing
the
right
[+]
button
in
4-split
mode
: CH7
CH7CH8
CH7CH8CH9 CH7CH8CH9
CH8
CH16
CH9
CH16
CH9
CH16
CH16
CH3CH9
CH3CH9
CH4
CH3
CH4
CH3
CH4
CH4
CH7CH8
CH7CH8CH9 CH7CH8CH9
CH8
CH10
CH11
CH12
CH13
Channel (CH 1~4)  Channel (CH 5~8)  Channel (CH 9~12)  Channel (CH 13~16)  Auto Sequence
CH1
CH2
CH2
13-16
9-12
5-8
1-4
CH10
CH11
CH12
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH7
CH8
CH9
CH13
Channel Setting
CH2
CH1
CH3
CH4
CH1
CH2
CH3
CH10
CH11
CH12
CH1
CH2
CH3
CH4
CH5
CH6
CH13
CH14
CH15
CH4
CH5
CH6
CH7
CH8
CH9
CH16
CH7
CH8
CH9
You can display
the channel in a desired
area of a split screen.
CH1
CH1
CH1
CH2
CH3
CH4
1. Place the cursor over the camera name of each channel to display the <%> key to the right on the screen.
CH2
CH4
CH5
CH7
CH8
CH1
CH2
2. Click a camera name to display a channel list where you can select a different channel.
3. Select CH1
a desired channel
and clickCH1it.
CH2
CH2
CH1
CH2
CH5
CH6
CH9
CH10
CH13
The current channel will be switched to the selected one.
Use the cursor to select a channel to move, and drag and drop it to a desired channel; this can also
CH9
changeCH3theCH3channelCH4position.
CH7
CH8
CH11
CH12
CH15
CH4
`` Ex : if switching CH 1 to CH 7
CH3
CH6
CH3
CH4
CH5
CH6
CH7
CH8
CH9
CH1
CH2
CH3
CH4
CH1
CH10CH2CH1
CH3CH2
CH11
CH4CH3
CH12
CH4
CH1
CH5
CH6CH5
CH13
CH7CH6
CH14
CH8CH7
CH15
CH8
CH9
CH9
CH10
CH10
CH11
CH11
CH12
CH16
CH13
CH13
CH14
CH14
CH15
CH1
;
CH4
CH4
CH12
CH15
CH16
CH2CH2
CH5
CH6
CH5
CH5
CH9
CH7
CH16
CH7
CH7
CH2
CH13
CH8
CH3
CH6
CH10
CH8
CH14CH9
Switching to Single Mode
CH3
CH3
CH4
CH1
CH6
CH8
CH11
CH12
CH9
CH15
CH16
CH1
CH3
CH14
CH16
CH2
CH4
CH3
CH2
CH5
CH6
CH9
CH10
CH13
CH14
When in
CH1 split mode,
CH2 select and double-click a desired channel to switch to its Single mode.
CH3 the remote control to switch to its Single mode.
CH1 a desired channel
Press the number corresponding to
Refer to “Remote
Control
> Using the
numeric CH12
buttons”. (PageCH1515)
CH7
CH8
CH11
CH16
`` Ex : If double-clicking CH 3 or pressing the number “3” on the remote control.
CH3
CH1
CH2
CH3
CH4CH1
CH5
CH6
CH7
CH8CH5
CH9
CH10
CH11
CH12
CH9
CH13
CH14
CH15
CH16
CH13
CH2
CH6
CH8
CH4
CH4
CH2CH7
CH3
CH6CH5
CH9
CH10
CH1
CH3CH2
CH4CH3
CH4
CH5
CH4
CH1
CH8CH1
CH10
CH11
CH4
CH11
CH12
CH12
CH19
CH7
CH2
CH1
;
CH7CH6
CH8
CH13
CH14
CH15
CH16
CH14
CH15
CH16
CH7
CH10
CH11
CH12
CH13
CH6
CH5
CH5
CH4
CH2
CH5
CH7
CH3
CH6
CH3
CH6
CH3
CH8
CH9
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH2
CH1
CH2
CH3
CH1
CH3
CH1
CH2
CH6
CH8
CH10
CH1
CH3
CH1
CH4 CH1
CH7
CH7
CH1
CH2
CH4
CH5
CH2
CH3
CH7
CH5
CH6
CH19
CH12
CH8
CH13
CH9
CH4
CH1
CH1
CH4
CH6
CH5
CH1
CH7
CH2
CH3
CH5
CH2
CH6
CH1
CH1
CH2
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH3
CH4
CH1
CH2
CH3
CH10
CH11
CH12
CH1
CH2
CH3
CH4
CH5
CH6
CH13
CH14
CH15
CH4
CH5
CH6
CH7
CH8
CH7
CH8
CH9
CH1
CH4
CH11
CH4
CH1
CH2
CH2
CH3
CH5
CH2
CH6
CH1
CH9
CH1
CH3
CH1
CH16
CH2
CH5
CH4
CH8
CH9
CH4
CH1
CH2CH2
CH3
CH3
CH4
CH10 CH7
CH2
CH11
CH5
CH6
CH7
CH8
CH5
CH6
CH3
CH7
CH1
CH6
CH8
CH2
CH9
CH11
CH3
CH12
CH4
CH1
CH8
CH1
CH2
CH1
CH2
CH3
CH4
CH10
CH13
CH14
CH12
CH15
CH16
English _37
CH3
CH1
CH2
●● live
CH1
2013-01-01
01:10:25
2013-01-01
01:10:25
live
Zoom
2013-01-01
This is available
only in Single Live mode. In Single mode, select a desired area and use the Zoom function to enlarge
01:10:25
it twice.
1. Select <Zoom In> in the right-click menu.
2013-01-01
Press
the [ZOOM] button on the remote control, or simply click <
01:10:25
box appears.
> in the launcher menu. The zoom
2. Use the direction keys, or drag and drop to specify an area to enlarge.
2013-01-01
01:10:25
3. Press
the [ENTER] button, or double-click the selected area to enlarge it twice.
01:10:25
`` In the enlarged image, use the direction buttons (▲▼_ +) on the remote controlto2012-01-01
move the enlarged
area.
2013-01-01
4. Press
the [ZOOM] button on the remote control, or simply click <
01:10:25
the zoom.
> in the launcher menu to release
2013-01-01 01:10:25
2013-01-01 01:10:25
;
Audio ON/OFF
You can turn the sound on/off corresponding to the channel in Live mode.
AUDIO ON/OFF in Single mode
Click the audio icon (
) on the screen press the [AUDIO] button on the remote control to turn it on/off.
the channel where <Audio> is set to <ON> in “Device > Camera” displays the audio icon (
MM `` Only
you can use to turn the sound on/off.
Freeze
This is available only in Live mode, this pauses playing the Live image temporarily.
1. Press the [FREEZE] button the remote control, or click <
The playback of the image is stopped temporarily.
`` Sound continues to play during the freeze.
2. Press the [FREEZE] button again, or click <
This will release the freeze.
38_ live
>.
> in the launcher men.
) in Live mode that
CH5
CH6
CH8
CH9
Event
Monitoring
CH4
CH2
CH3
CH6
CH7
CH10
CH11
CH14
CH5
CH15
CH6
CH3
CH16
CH7
CH3
CH3
CH6
CH9
• If multiple events occur simultaneously, the screen will switch to a split mode.
CH7
CH8
CH9
-- 2~4 events : 4-split mode
-- 5~9 events : 9-split mode
-- 10~16 events : 16-split mode
• If the second event occurs
CH2within the set time of <Event Display>, the first event will last until the second
one is terminated. (Page 58)
`` ExCH1: If you set <Event Display>
to 5 seconds, and only one event occurs in CH 1.
CH3
CH4
CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
Event occurrence
CH4
CH5
CH6
CH7
5 seconds
CH2
CH4
CH5
CH3
CH7
CH1
CH5
CH6
CH19
CH7
CH11
CH12
CH13
CH2
CH3
CH5
CH6
CH2
CH3
CH4
CH5
CH6
`` Ex : If you set <Event Display> to 5 seconds, and the second event occurs in CH 2 within the set time after the first
event occurred in CH 1.
CH2
CH1 occurrence
Event
4 seconds
CH2
CH1
CH4
Stop alarm
CH7 CH8 CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH1
CH9 CH10 CH11 CH12 CH13 CH14 CH15 CH16
CH2
CH1
9 seconds
CH1
Stop alarm
CH2
CH11
CH3
CH12
CH5
CH14
CH6
CH15
CH8
CH9
CH2
CH5
CH8
CH2
CH6
CH4
CH8
CH11
CH2
CH14
CH6
CH3
CH2
CH4
CH1
CH5
CH3
CH7
CH8
CH2
CH3
CH1
CH1
CH2
CH2
CH3
CH4
CH6
CH4
CH9
MM `` Press the [ALARM] button to reset the alarm settings and to release the event mode.
CH1
CH10
CH2
CH11 activates
CH12
CH2 the event
CH3
`` If an alarm
in the conditionCH1you have set
record, and pre/post alarm times, the event record will be
CH3
CH9
CH13
CH6
performed.
CH14
CH10
CH15
CH13
CH4
CH5
CH14
CH1
CH2
CH6
case of continuous events such as motion detection, switching to another split mode display may not immediate if
JJ `` Inconcatenating
events follow, even when you stopped alarm of the event.
CH9
CH16
CH11
CH12
CH2
CH1
CH1
CH1
CH4
CH15
CH8
CH10
CH11
CH12
CH14
CH4
CH15
CH16
CH7
CH15
CH12
CH1
CH2
CH4
CH5
CH5
CH7
CH8
CH16
CH9
CH3
CH4
CH13
CH14
CH15
CH16
CH3
CH1
CH7
CH3
CH8
CH6
CH6
CH9
CH8
CH2
CH3
CH6
CH4
CH7
CH9
CH2
CH3
CH10
CH4
CH6
CH7
CH8
CH5
CH6
CH1
CH8
CH10
CH11
CH8
CH12
CH9
CH11
CH10
CH11
CH12
CH12
CH9
CH2
CH10
CH3
CH4
CH11
CH12
CH13
CH14
CH15
CH16
English _39
●● live
CH3
CH6
CH2
CH5
CH8
CH3
CH2
This will display the channel in sync with a specific event (Sensor/Motion/Video Loss) if it occurs.
CH5
CH6
InCH12
“MonitorCH4
> Event Display”,
set the event monitoring to ON/OFF and specify the event display time. (Page 58)
CH2
CH2
CH5
CH1
CH2
CH8
main menu
You can setup the system properties, devices, and options for recording, event, backup
and network.
System Setup
You can setup Date/Time/Language, Permission, System Properties and Log.
Date/Time/Language
You can check and setup the current Date/Time and time related properties, as well as the language used for
the interface on the screen.
Setting the Date/Time/Language
Set the Date/Time/Language
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control.
`` If not logged in, it prompts with login window.
Refer to “Login”. (Page 28)
2. Use the left/right buttons (_ +) to select the <System>.
System property setup menu is selected.
3. Use the up/down buttons (▲▼) to select <Date/Time/
Language> and press the [ENTER] button.
4. Select <Date/Time/Language>.
A dialog to setup Date, Time and Language.
Logout
System
Date/Time/Language
Permission Management
System Management
5. Use direction buttons (▲▼_ +) to select an item to set
and make your changes.
• Date : Sets the date that will appear on the screen.
You can select the date format.
• Time : Sets the time and its format that will appear on the
screen.
Select either one from <24 Hours, 12 Hours (AM/PM)>.
• Time Zone : Sets the time zone of your area based on the
Greenwich Mean Time (GMT).
`` GMT (Greenwich Mean Time) is standard World Time and the basis
of world time zone.
Log Information
Date/Time/Language
Date/Time/Language
Holiday
 Date
2013-01-01
YYYY-MM-DD
 Time
08:14:24
24 Hours
 Time Zone
GMT
 Time Sync.
 DST
 Language
Setup
Dec First (Sun) 0
Dec First (Sun) 0
English
OK
Cancel
• Time Sync. : You can set the DVR’s current time
synchronized to a selected <Time Server> regularly if you select to use <Time Server>.
In this case, <Date/Time/Language> setup does not allow time adjustment.
40_ main menu
Return
-- Time Server : Enter an IP or URL address of the time server.
Date/Time/Language
-- Last Sync Time : Displays the most recent synchronization
Date/Time/Language
Holiday
time from the selected time server.
Time Synchronization Setup
-- Activate as Server : Set to <Use> to allow the DVR to act
as a Time Server for other DVRs.
• DST : Set up Daylight Saving Time with its period to make
the time earlier than the GMT of its time zone by 1 hour
during the set period.
• Language : Select your language. Sets the language for the
interface.
English, French, German, Spanish, Italian, Chinese(Simplified),
Russian, Korean, Polish, Japanese, Dutch, Portuguese, Turkish, Czech, Danish, Swedish, Thai, Romanian,
Serbian, Croatian, Hungarian, Greek, Chinese (Traditional), Finnish and Norwegian are available.
 Date
2013 -01-01
YYYY-MM-DD
 Synchronization Use
08:14:24
24 Hours
 Time
203.248.240.103
 Time Server
GMT+08:00
 Time Zone
Fail
 Last Sync Time
Setup
Not Used
 Time Sync.
 Activate as Server Use
Dec First (Sun) 0H
Dec First (Sun) 0H
 DST
 Language
OK
Cancel
OK
Cancel
English
MM `` You can also use numeric buttons on the remote control to enter values for Date, Time and other numeric fields.
Setting Holiday
You can set specific dates to Holidays according to your preferences.
Holidays are applied to <Recording Schedule> and <Alarm Schedule> too.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Date/Time/Language> window to select <Date/Time/Language>, and
press the [ENTER] button.
2. Select <Holiday>.
Date/Time/Language
A calendar for Holiday setup appears.
Holiday
Date/Time/Language
3. Use the left/right <
> buttons to select year or month,
2013
Jan
and press the [ENTER] button.
Sun Mon Tue
Wed Thu
Fri
Sat
1
2
3
6
7
8
9
10
11
12
13
14
15
16
17
18
19
25
26
Sat
5
20
21
22
23
24
27
28
29
30
31
OK
4. Use direction buttons (▲▼_ +) to select a desired date,
and press the [ENTER] button.
You will see the “Setting Holiday” screen.
`` Ex : Select January 14th and check on <1/14> only to make every
January 14th a holiday. Check both on <1/14> and
<Jan 2nd Mon> to make every January 14th and 2nd Monday of
January holidays.
5. When the Holiday setup is done, press <OK>.
4
5
Cancel
Date/Time/Language
Holiday
Date/Time/Language
2013
Jan
Setting
Sun Holiday
Mon Tue
Wed
2
Thu
3
Fri
4
8
9
10
11
12
15
16
17
18
19
25
26
1
6
7
13
14
1 / 14
Jan 2nd Mon
20
21
OK
22
23
27
28
29
30
OK
Cancel
24
31
Cancel
Using the Calendar
Using the mouse may help make setup easier.
 Select year and month.
Select the left/right <
> key on the left/right side of year/month and press [ENTER] button to adjust
by 1 year/month.
 Use direction buttons to select a date and press [ENTER] button.
`` A date with recorded data to be searched will appear in yellow in the System Log, Event Log, Time Search and Event Search.
English _41
●● main menu
6. When the Date/Time/Language setup is done, press <OK>.
main menu
Permission Management
You can set permissions of each user over the DVR's specific function and settings.
Setting the Administrator
You can set and change Administrator’s ID and password.
The administrator can use and set all menu items and functions.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Permission Management>, and press
[ENTER] button.
2. Select <Admin>.
A dialog for Admin ID and Password input appears.
Permission Management
Admin
Group
User
 ID
admin
 New Password
************
 Confirm P/W
************
Setup
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the ID and password.
default, initial ID and password are set to “admin”, and
MM `` By“4321”.
OK
Cancel
`` The default password can be exposed to a hacking thread so it is recommended to change the password after installing
the product.
Note that the security and other related issues caused by the unchanged password shall be responsible for the user.
4. When the administrator setup is done, press <OK>.
Using Virtual Keyboard
 For alphanumeric inputs, the virtual keyboard window
appears.
 Use direction buttons (▲▼_ +) to move to a desired
character, and press the [ENTER] button.
`
1
2
3
4
5
6
7
8
9
0
-
=

q
w
e
r
t
y
u
i
o
p
[
]
\
Del
a
s
d
f
g
h
j
k
l
;
‘
Caps Lock
 In the upper text input box of the virtual keyboard, there
Space
displays a list of candidate words containing the selected
character.
 Select a word from the list, or use the keyboard to enter the whole word.
`` If there are many of candidate words, use < , > buttons to move between them forward and backward.
z
x
c
v
b
n
OK
`` You can use mouse wheel and jog shuttle button too.
 Select <OK>.
Entered word is applied.
`` For upper case letters, use <Caps Lock> button.
``
``
``
``
``
For special characters, use <Shift> button.
Using the virtual keyboard is the same to a normal keyboard use in your region.
You can enter the ID with case-insensitive alphanumeric characters only.
For the password, use alphabets and special characters excluding < \ > and <">.
You can use number buttons on the remote control.
42_ main menu
m
,
.
Cancel
/Shift
Ctrl
Setting the Group
You can create user groups and setup permissions for those user groups.
You can register a user for each group in <User>.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Permission Management>, and press
[ENTER] button.
Group
Admin
User
 Group
Setup
Add
Delete
Rename
 Group Authority
Live View
Setup
Search
Setup
Backup
Setup
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Add, Delete, Rename : You can add, delete, rename a
group or modify the permissions given to the group.
The virtual keyboard appears when <Add> or <Rename> was selected.
OK
●● main menu
2. Select <Group>.
A window for <Add>, <Delete>, <Rename>, and
<Group Authority> setup appears.
Permission Management
Cancel
-- Add : When you first run the DVR with the admin account, only the admin account exists. Add has already
been deactivated. Select <Add> to display the virtual keyboard. Enter a group name. You can add up to
10 groups.
-- Delete : Deletes a user group that is already registered. Selecting Delete will delete all user accounts
belonging to that group.
-- Rename : Renames a group that is already registered. Select <Rename> to display the virtual keyboard.
`` For entering a group name, refer to “Using Virtual Keyboard”. (Page 42)
• Group Authority : Sets permissions to access menu items of each group.
Users of a group can access checked functions.
4. When the group setup is done, press <OK>.
To set the group authority
You can set the permissions of the group users to access the menu according to the channel.
1. Select a menu to which the group permission is assigned.
The menu where the group permission is assigned will be
displayed in the Live menu when a group user logs in.
• Live View : You can set the permission to access the Live
screen according to the channel.
• Search : You can set the permission to access the Search
menu according to the channel.
• Backup : You can set the permission to access the Backup
menu according to the channel.
Permission Management
Group
Admin
 Group
 Group Authority
Channel
Live View
Search
Backup
User
All
1
5
9
13
Setup
Add
ABC
Delete
Rename
Setup
Setup
Setup
Setup
2
3
6
Setup 10
7
14
OK
OK
4
8
11
12
15
16
Cancel
Cancel
2. Select <OK>.
Select and assign a group user so that the user can access the specified menu.
English _43
main menu
To restrict the user permissions
If the admin restricts all permissions of an added group, the users belonging to that group can access only
the default minimum menus and can change the user’s own password only.
1. Start the DVR.
If all permissions are restricted, only the Login dialog
should appear.
2013-01-01 01:10:25
2. Log in with a registered user ID.
Login
 ID
abc
 Password
OK
3. Right-click any area on the screen.
If all permissions are restricted, only the accessible context
menus should appear.
Cancel
2013-01-01 01:10:25
Scene Mode

Audio Off
Freeze
Stop Alarm
Record
User Menu
Hide Launcher
Logout
To change the user password
If you log in with a user account that is restricted to access the menu, you can change your own password only.
1. Log in with your account.
2. Select <User Menu>.
The Permission Management setup screen appears.
3. Select <Permission Management>.
The Password setup dialog appears.
Permission Management
User
 ID
USER
 New Password
************
 Confirm P/W
************
4. Enter a new password.
5. Select <OK>.
You change to the password will be applied.
44_ main menu
OK
Cancel
Setting the User
You can add a user and edit information of a registered user.
Users can be added only if a group was created in <Group> menu.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Permission Management>, and press
[ENTER] button.
Admin
• Viewer : If you select <Use>, you will be given access to the
Web Viewer and Network Viewer.
Setup
All Group
Group
Add
Name
3. Use direction buttons (▲▼_ +) to select <Add> from the
window.
A window for “Add User” appears.
4. You can configure the Network Viewer settings including
name, ID, viewer, Select Group and password.
Result of the user setup appears in the <User> window.
To change the user property, use “Edit User”.
The “Edit User” window appears when you select a
desired item to be changed in the <User> window.
User
Group
 Group
ID
Viewer
Delete
Previous/Next Page
OK
Cancel
Permission Management
Admin
 Group
User
Group
Setup
Add
User
All Group
Group  Name
Add
Name
ID
Viewer
Delete
 ID
`` Refer to “Connecting Web Viewer”. (Page 86)
 Viewer
Not Used
 Select Group
ABC
 Password
 Confirm P/W
`` For more information about use of Network Viewer, refer to the
OK
Cancel
Previous/Next Page
Network Viewer's user guide.
OK
5. When the user setup is done, press <OK>.
Cancel
Setting Permissions
You can set restricted access for all general users.
Items with restrictions will require logging in for use.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Permission Management>, and press
[ENTER] button.
2. Select <Setup>.
The Restricted Access, Restriction on Network Access,
Auto Log out, Manual Input of ID setup screen appear.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
Permission Management
Admin
Group
Setup
User
 Restricted Access
Live View
Search
Backup
All
 Restriction on Network Access
All Network
 Auto Log out
 Manual Input of ID
Web Viewer
OFF
ON
OFF
• Restricted Access : All menu items allowed for a user can
be set with restricted access.
-- Checked ( ) : Restricted
-- Not checked ( ) : Accessible
`` If it is not checked ( ) in <Restricted Access>, any user can access the item no matter what the <Group Authority>
setting.
OK
Cancel
) in <Restricted Access>, a user can access the item only if the user has permission in <Group
Authority> setting.
`` If it is checked (
• Restriction on Network Access : Restricts remote access from a <Restricted Access> network.
-- All Network : Restricts all access instances via Network Viewer and Web Viewer.
-- Web Viewer : Restricts access via the Web Viewer.
• Auto Log out : A user will be automatically logged out if there is no operation on DVR for over set period of
time.
English _45
●● main menu
2. Select <User>.
A window for Add User appears.
Permission Management
main menu
• Manual Input of ID : Prompts you to enter the user ID
manually for the login process.
-- Checked ( ) : Encloses the registered user IDs with the
[] symbols.
Use the virtual keyboard to enter the user ID.
Login
 ID
4. When the permission setup is done, press <OK>.
*****
 Password
OK
Cancel
System Management
You can check the system version, update to a newer version, as well as data backup and initialization.
Checking the System Information
You can check the current system version, broadcasting system, MAC address. You can update the system.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <System Management>, and press [ENTER]
button.
2. Check the Software Version, Broadcast Format and MAC
Address.
• System Information : Shows the current system’s
information.
The values can not be changed by a user.
• S/W Upgrade : Updates the DVR’s software up to date.
• DVR Name : Assigned name will be displayed in Network
Viewer, when connected to the DVR.
46_ main menu
System Management
System Information
Settings
 System Information
 Software Version
v1.0xh_yymmddhhmmss
 Broadcast Format
NTSC
 MAC Address
00:00:F0:54:FF:FF
 S/W Upgrade
Search
 Device
Network
 Version
No S/W Data
 DVR Name
DVR
OK
Previous
• Updating the Software
1. Connect a device storing the software to be updated. (It may take about 10 seconds to recognize the
device.)
`` Upgradeable devices include USB memory and network device.
`` To update the network, the current DVR should have been connected to the network.
Upgrade via the proxy server may not be enabled due to the restricted access.
2. Select <System Management> from <System> window.
4. Press <Search> button to display updated image, then the <Search> button switches to <Upgrade>.
`` The <Upgrade> button will be activated only if the current <Software Version> of the <System Information> is same to
or older than that of <S/W Upgrade>.
5. Press <Upgrade> button to display confirmation popup
for upgrading.
Press <OK> in the “System Upgrade” window.
`` While updating, it shows the progress.
System Management
System Information
Settings
 System Information
 Software Version
System
Format
 Broadcast
v1.0xh_yymmddhhmmss
Upgrade
NTSC
 MAC Address
Current Version 00:00:F0:54:FF:FF
v1.0xh_yymmddhhmmss
New Version
v1.0xh_yymmddhhmmss
 S/W Upgrade
Do you want to upgrade?
Network
 Device
OK
Cancel
No S/W Data
 Version
 DVR Name
Search
OK
DVR
Previous
System Management
System Information
Settings
 System Information
 Software Version
v1.0xh_yymmddhhmmss
Format
 BroadcastS/W
NTSC
Upgrade
 MAC Address
00:00:F0:54:FF:FF
Software upgrading...
 S/W Upgrade
Search
 Device
Network
 Version
No S/W Data
 DVR Name
DVR
OK
Previous
6. When the updating is done, it automatically restarts.
Do not turn the power off until it finishes restarting.
“Upgrade Failed” appears, retry from the step 4.
MM `` IfWhen
you experience continued failure, consult the service
center for assistance.
`` When you perform S/W update remotely using Smart Viewer,
it may take a max of 3 minutes to complete the update since
Smart Viewer popped up a confirmation message. This is to
guarantee that the DVR set operates stably. For a faster update,
use the USB cable to connect to the DVR set.
English _47
●● main menu
3. Select <System Information>.
main menu
Settings
You can copy and import the DVR settings by using a storage media.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <System Management>, and press [ENTER]
button.
2. Select <Settings>.
A window of storage device and load factory default
appears.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and export or import settings data to a storage device.
System Management
Settings
System Information
 Storage Device
0 MB (Remained Capacity)
 DVRUSB
38010100
Export
 USBDVR
No data
Import
Include Network Settings
 Load Factory Default
Default
• Storage Device : Shows the connected storage device.
Previous
• Export : All logs recorded in the DVR are exported to the
storage media.
• Import : Imports DVR settings from the storage device and applies to the DVR.
`` If <Include Network Settings> is checked, the network settings will be imported too.
• Load Factory Default : If <Default> is selected, a
confirmation dialog for “Load Factory Default” prompts.
Press <OK> to initialize the system to the factory default.
4. To move to the previous menu, press <Previous>.
System Management
Settings
System Information
 Storage Device
Load
 DVRUSB
 USBDVR
Factory
Default
38010100
0 MB (Remained Capacity)
Export
Import
Sure to Default Setting?
Include Network Settings
Recording stops few second.
No date
OK
Default
 Load Factory Default
Cancel
Previous
Log Information
You can browse logs on the system and events.
System Log
System Log shows log and timestamp on every system start up, system shutdown, and changes on system
settings.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Log Information>, and press [ENTER] button.
2. Select <System Log>.
Search Day
`` Refer to “Using the Calendar”. (Page 41)
Click on the calendar <
Log Information
System Log
First Page
No.
Event Log
2013-01-01
Backup Log
Search
Last Page
Type
Log List
> to display the calendar window.
• Type : When there are too many logs, you can display logs
of the desired format by selecting the type.
• Export : All logs recorded in the DVR are exported to the
storage media.
Previous/Next Page
Export
3. Use direction buttons (▲▼_ +) to move to a desired item, and press <Search>.
48_ main menu
View all
Date/Time
Previous
Event Log
Event log shows recorded events on alarms, motion detections and video loss.
It also shows the log and its timestamp.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Log Information>, and press [ENTER] button.
2. Select <Event Log>.
System Log
Search Day
4. Set Search Day, Channel and Type and the press
<Search>.
`` Refer to “Using the Calendar”. (Page 41)
> to display the calendar window.
First Page
Event Log
Backup Log
Search
2013-01-01
Last Page
CH
All CHs
Type
View all
No.
Log List
Date/Time
7
Motion Detection [CH 7]
2013-01-01 00:02:18
6
Motion Detection [CH 6]
2013-01-01 00:02:18
5
Motion Detection [CH 5]
2013-01-01 00:02:18
4
Motion Detection [CH 4]
2013-01-01 00:02:18
3
Motion Detection [CH 3]
2013-01-01 00:02:18
2
Motion Detection [CH 2]
2013-01-01 00:02:18
1
Motion Detection [CH 1]
2013-01-01 00:02:18
Previous/Next Page
Export
Previous
Backup Log
You can find out who backed up and the details (backup time, channel, device to use, file format, etc.).
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <System> window to
move to <Log Information>, and press [ENTER] button.
2. Select <Backup Log>.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and select it.
4. Specify a search term and select <Search> in the right
corner.
Backup details for the search term will be listed.
Log Information
System Log
Search Day
First Page
No.
Export
Backup Log
Event Log
2013-01-01
~
Last Page
Search
2013-01-02
Previous/Next Page
User
Date/Time
Previous
English _49
●● main menu
3. Use direction buttons (▲▼_ +) to move to a desired item,
and select it.
Click on the calendar <
Log Information
main menu
Setting the Device
You can setup Camera, Storage Device, Remote Device and Monitor.
Camera
Setting the Camera
You can set Video, Audio, Channel Name and Dwell Time of a Camera.
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control.
2. Use the left/right button (_ +) to select <Device>.
Device setting menu is selected.
Logout
3. Use the up/down buttons (▲▼) to move to <Camera>,
and press [ENTER] button.
Return
Device
Camera
Storage Device
Remote Device
Monitor
4. Select <Camera>.
Displays settings window for Video, Audio, CH Name,
SEQ-Dwell Time, Screen Setup and Privacy Region.
5. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Video
-- <ON/OFF> : You can turn ON/OFF the selected channel’s
camera.
Camera
Camera
CH
PTZ
Video 
Audio
CH Name
SEQ-Dwell Time 
1
ON

OFF

CAM 01
2
ON

OFF

CAM 02
5 sec

3
ON

OFF

CAM 03
5 sec

4
ON
OFF


CAM 04
5 sec
5 sec


5
ON

OFF

CAM 05
5 sec

6
ON

OFF

CAM 06
5 sec

7
ON

OFF

CAM 07
8
ON

OFF

CAM 08
5 sec

5 sec

Previous/Next Page
Screen Setup
Privacy Region
-- <Covert1> : Shows information other than the video of
the selected channel.
OK
Cancel
`` For privacy protection, it does not display the video while the recording continues.
-- <Covert2> : Shows nothing but an empty screen while the recording continues.
the channel is set to <Covert1> or <Covert2> mode, the channel’s sound is not hearable.
MM `` IfHowever,
the channel’s sound is recorded if its Audio setting is set to <ON>, even the sound is not heard in Live mode.
• Audio
-- If set to <ON>, you can turn the audio of the channel ON/OFF on the Live screen.
-- If set to <OFF>, the channel’s audio is off on the Live screen and not recorded.
`` Audio output is available for only 1 channel.
50_ main menu
• CH Name : Up to 15 characters including blanks are allowed. (The first character should not be empty.)
`` Refer to “Using Virtual Keyboard”. (Page 42)
• SEQ-Dwell Time : You can set the dwell time between channels for the Live screen and Spot Out.
`` If set to <OFF>, the channel is not listed in the Auto Sequence mode.
`` Press the <Init> to initialize settings back to the default 50.
• Privacy Region : You can specify a certain area of the
camera video to be protected for your privacy.
Screen Setup
CH1
50
50
6. When the camera setup is done, press <OK>.
Init
50
OK
Apply to All CH
Cancel
To set the privacy zone
 Select <Privacy Region>.
 When “Privacy Region” window appears, select a
channel for detection and set the area of motion
detection.
• To set the area in “Privacy Region” window
In the “Privacy Region” window, select desired region
from <
>.
• Privacy Region
Privacy Region
CH1
Privacy Region1
Individual
You can specify up to 4 privacy zones for each channel,
which can be identified by the color.
1
Purple 2
Green 3
Blue 4
OK
Apply to All CH
Cancel
Yellow
• To set the area using <Individual> selection
In the “Privacy Region” window, you can select cells individually by using <Individual>.
When selected <Individual>, “Privacy Region” window disappears and you can select cells one by one.
When the motion area setup is done, Right-click to select <Menu> in the context menu or the [MENU]
button on the remote control to display the “Privacy Region” window again.
-- Clear All : Selected cell is removed from the Privacy Region.
Clear All
-- Menu : After selecting individual motion areas, move to the “Privacy Region” window.
`` If selected <Apply to All CH>, selected motion area is applied to all channels.
Menu
 When completing the privacy zone settings, click <OK>.
English _51
●● main menu
• Screen Setup : The video appeared on the screen may vary
depending on the channel’s camera, configure the DVR
display to your preferences.
Select a channel and adjust the < (Brightness)>,
< (Contrast)>, and < (Color)> of the selected channel.
main menu
Setting the PTZ
To use Camera’s PTZ functions, ID and protocols of each camera and DVR should be matched.
For other settings, refer to the <Remote Devices> settings. (Page 56)
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Camera>, and press [ENTER] button.
2. Select <PTZ>.
A window of PTZ settings appears.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and select it.
• ID : Set the ID of the connected camera of each channel.
You can easily setup by using the numeric buttons on the
remote control.
Camera
Camera
PTZ
CH
ID
1
0
>
None

2
1
>
None
Protocol

3
2
>
None

4
3
>
None

5
4
>
None

6
5
>
None

7
6
>
None

8
7
>
None

Previous/Next Page
OK
Cancel
• Protocol : Set the protocol of the connected camera of each
channel.
MM `` You can check the camera’s ID and protocol if you turn the camera off and on after connecting it to the DVR.
4. When the PTZ setup is done, press <OK>.
52_ main menu
Storage Device
You can check information on storage devices.
Confirming Devices
You can check storage devices and their free space, usage as well as status.
Devices available are HDD, and USB devices (Memory, HDD).
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Storage Device>, and press [ENTER] button.
2. Select <Device>.
• No. : Shows the assigned number of the internal HDD.
Storage Device
Device
Format
HDD Alarm
Device
No.
Used/Total
Usage
Status/Management
HDD
1
3.92G/0.98T
Internal
Normal
• Used/Total : Shows the used/total capacity of the storage
device.
• Usage : Sets the storage device’s usage.
-- USB memory is used only for backups.
`` External USB HDD, SATA HDD are used for extension and backup.
OK
Cancel
`` A maximum of 2TB for each port is supported for backup on a high capacity SATA HDD such as RAID equipment
(ex: SVS-5R), and a maximum of 4TB for extension purposes.
`` SVS-5R supports only RAID1 and RAID5.
`` If an eSATA HDD device is used for extended storage or backup purposes, disconnecting eSATA device may restart the
system.
For backup use, the device can be disconnected if it’s not in use.
• Status/Management : Shows the current status of the HDD, as in Normal/Check/Replace.
-- Normal : Available to use
-- Check : Available to use but recommended to replace
-- Replace : Requires immediate replacement.
3. To move to the previous menu, press <OK>.
English _53
●● main menu
Using the mouse may help make setup easier.
main menu
Formatting
You can format a storage device.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Storage Device>, and press [ENTER] button.
2. Select <Format>.
A window for selection of device for formatting appears.
Storage Device
Format
Device
Device
HDD
HDD Alarm
Select
1
Used/Total
Usage
3.92G/0.98T
Internal
3. Use direction buttons (▲▼_ +) to select a device to be
formatted.
OK
4. Select <Format> on the bottom of the screen.
Press <OK> on the “Manage” confirmation window will
start formatting the selected device.
5. When the formatting is done, press <OK>.
Cancel
Storage Device
Format
Device
Device
HDD
HDD Alarm
Select
1
Used/Total
Usage
3.92G/0.98T
Internal
Manage
Formatting deletes all recordings.
Proceed formatting?
Recording stops few second.
OK
Cancel
Format
OK
54_ main menu
Cancel
HDD Alarm
You can set alarm settings for HDD defects such as Check Alarm Output Port, Replace Alarm Output Port,
and its duration.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Storage Device>, and press [ENTER] button.
3. Use direction buttons (▲▼_ +) to move to the desired
item.
Device
HDD Alarm
Format
BEEP
 Check Alarm Output Port
 Duration
OFF
●● main menu
2. Select <HDD Alarm>.
A window for setting HDD check and replace output ports
and their durations appears.
Storage Device
BEEP
 Replace Alarm Output Port
 Duration
OFF
• Check Alarm Output Port : If HDD generates check alarm,
the alarm signal will output to the specified alarm output
port.
OK
Cancel
• Replace Alarm Output Port : If HDD generates replace alarm, the alarm signal will output to the specified
alarm output port.
• Duration : Sets the alarm duration for the alarm signal and beep sound.
-- If <BEEP> was selected, a beep will sound.
status means that the HDD is operating but it has problems that require technical examination.
MM `` <Check>
(
) appears on the Live screen.
`` <Replace> status means that the HDD has defect and requires immediate replacement.
(
) appears on the Live screen.
`` If the installed HDD is not recognized properly, a confirmation popup will appear.
4. When the HDD Alarm setup is done, press <OK>.
Remote Devices
You can set the RS-485 communication for use of PTZ Camera with the DVR.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Remote Device>, and press [ENTER] button.
2. Use direction buttons (▲▼_ +) to move to the desired
item, and press [ENTER] button.
3. Set the values of each communication setup of the remote
device.
• Baudrate : Baud rate settings of the DVR, PTZ camera
should be matched for proper operations.
4. Make sure to match IDs of the DVR and Remote Control,
and press <OK>.
Remote Device
Baudrate
9600
Remote Control
Parity

None
Data
8

ON
ID
OK
Stop Bit
1

Transfer type

Half Duplex
0
Cancel
MM `` For changing the remote control’s ID, refer to “Changing the Remote Control ID”. (Page 15)
English _55
main menu
Monitor
You can configure information to be displayed and its format for monitor.
Setting the Monitor
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Monitor>, and press [ENTER] button.
2. Select <Monitor>.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Event Display : Sets the dwell time of the event channel
display on the monitor when an event occurs.
If selected <Continuous>, it displays the channel until you
press [ALARM] button to release it.
Monitor
Monitor
 Event Display
Mode
OFF
 Display
Date
 Multi CH SEQ Time
5 sec
 VGA/HDMI
1280X720
Time
CH Name
Icon
Display Position Setup
OK
Cancel
• Display : Displays only checked items on the monitor
screen.
• Multi CH SEQ Time : Sets the interval between automatic display switching in 4-split and 9-split mode of
the Live screen.
• VGA/HDMI : Set your preferred screen resolution to <VGA> or <HDMI>.
If the monitor does not support selected resolution of <VGA> or <HDMI>, it may not display video properly.
-- Resolution : 1280 x 720, 1280 x 1024, 1920 x 1080
4. When the monitor setup is done, press <OK>.
Screen Setup
Some monitors many not display information (camera name, icon, time information, etc.) about the DVR,
depending on the condition. Then, you can change the display position of the data.
1. In the <Device> window, press the up/down (▲▼) button to move to <Monitor> and press the [ENTER]
button.
2. Select the <Monitor> item.
3. Select <Display Position Setup> in the bottom.
You will move to the <Display Position Setup> window.
4. Use the four direction buttons or the number buttons on
the remote control to adjust the data position.
2013-01-01 01:10:25
Display Position Setup
30
30
30
30
OK
56_ main menu
Cancel
Setting the Screen Mode
You can configure the Live screen and Split Screens.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Device> window to
move to <Monitor>, and press [ENTER] button.
2. Select <Mode>.
Monitor
Mode
 Live Screen
 Play Screen
• Live Screen : Select split modes for the Live screen.
16-, 9-, and 4-split screens are included by default.
• Play Screen : Select split modes for the playback screen.
Only the 13-split screen is optional.
Black shows the playback while white shows the Live
screen.
Live
OK
Play
Cancel
4. When the screen mode setup is done, press <OK>.
English _57
●● main menu
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
Monitor
main menu
Setting the Recording
You can setup scheduled recording, event recording and other recording related settings.
Recording Schedule
Make your reservation on a date and time to schedule the recording on specified time.
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control.
2. Use the left/right button (_ +) to select <Record>.
Record menu is selected.
Logout
3. Use the up/down buttons (▲▼) to move to <Recording
Schedule>, and press [ENTER] button.
Return
Record
Recording Schedule
Event Record Duration
REC Quality & Resolution
Record Option
4. Select <Recording Schedule>.
A window of scheduled recording setup appears.
5. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
Recording Schedule
CH1
All
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Hol
No Recording
Continuous
Event
Both(Cont&Evnt)
Apply to All CH
OK
• Apply to All CH : If selected <Apply to All CH>, “Apply to
All CH” window appears.
Press <OK> to apply the setup to all channels.
6. When the recording schedule setup is done, press <OK>.
MM
`` Event recording and scheduled recording starts about 3 seconds
prior to the event/schedule for guaranteed recording.
Recording Schedule
CH1
All
Sun
Mon
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Apply to All CH
Tue
Wed
Thu
Apply recording schedule to all channels?
Fri
OK
Sat
Cancel
Hol
No Recording
Continuous
Event
Both(Cont&Evnt)
Apply to All CH
OK
58_ main menu
Cancel
Cancel
Recording Color Tags
Color
Part Names
Functions
White
No Recording
No schedule / event recording
Blue
Event
Event recording only
Orange
Green
Continuous
Both(Cont&Evnt)
Scheduled recording only
Both scheduled / event recordings
●● main menu
Each press of a selected cell will cycle through <No Recording>-<Continuous>-<Event><Both(Cont&Evnt)>.
Event Record Duration
You can set the beginning and ending point of a recording on an event.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Record> window to
move to <Event Record Duration>, and press [ENTER]
button.
2. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Pre Event : The recording of an event will start at a
pre-determined time prior to the actual occurrence of the event.
If it is set to 5 seconds, the recording begins from
5 seconds before the event.
Event Record Duration
CH
Pre Event 
POST Event 
1
OFF

2
OFF

1 min

3
OFF

1 min

4
OFF
1 min

1 min


5
OFF

1 min

6
OFF

1 min

7
OFF

8
OFF

1 min

1 min

Previous/Next Page
OK
Cancel
• POST Event : The recording will continue for a
pre-determined time after the actual end of an event.
If it is set to 5 seconds, the recording ends in 5 seconds after an event.
3. When the event recording duration setup is done, press <OK>.
REC Quality / Resolution
You can set resolution, FPS, and quality of recordings by channel, and by recording type of standard / event.
For more information about the resolution, refer to the “Product Specification” section. (Page 114)
Setting Standard Recording Properties
You can set each channel’s resolution, quality and FPS for normal recordings.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Record> window to
move to <REC Quality & Resolution>, and press
[ENTER] button.
2. Select <Standard>.
3. When the recording setup is done, press <OK>.
REC Quality & Resolution
Standard
CH
Event
Resolution 
Record Rate 
Record Quality 
1
CIF

7fps

2
CIF

7fps

Level4

3
CIF

7fps

Level4

4
CIF
7fps


Level4
Level4


5
CIF

7fps

Level4

6
CIF

7fps

Level4

7
CIF

7fps

8
CIF

7fps

Level4

Level4

Previous/Next Page
OK
Cancel
English _59
main menu
Setting Event Recording Properties
You can set each channel’s resolution, quality and FPS for event recordings.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Record> window to
move to <REC Quality & Resolution>, and press
[ENTER] button.
2. Select <Event>.
Event recording setup window appears.
REC Quality & Resolution
Event
Standard
CH
3. Use direction buttons (▲▼_ +) to move to a desired item,
and select it.
Resolution 
Record Rate 
Record Quality 
1
4CIF

7fps

Level4

2
4CIF

7fps

Level4

3
4CIF

7fps

Level4

4
4CIF

7fps

Level4

5
4CIF

7fps

Level4

6
4CIF

7fps

Level4

7
4CIF

7fps

Level4

8
4CIF

7fps

Level4

Previous/Next Page
• Resolution : Sets the resolution of the recorded screen.
OK
• Record Rate : Image Per Second, means the frames
recorded per a second.
Cancel
• Record Quality : Sets the recording quality.
4. When the Event recording setup is done, press <OK>.
Record Option
You can set the recording to stop or overwrite when the HDD is full.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Record> window to
move to <Record Option>, and press [ENTER] button.
2. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Disk End Mode : If selected <Overwrite>, recording will
continue despite the HDD full while overwriting the oldest.
If selected <Stop>, the recording will stop when the HDD is
full.
Record Option
 Disk End Mode
Overwrite
Disk End Beep
Auto
Auto
DeleteDelete 180

day
The recording information will be deleted.
 Record Status
 HDD Free Space :
 Recordable (Date/Time) :
• Disk End Beep : If selected <Stop>, the button is activated.
If you check it, the beep will sound on the disk full and the
recording stops.
Do you want to proceed?
986 GB / 989 GB
OK
Cancel
OK
Cancel
• Auto Delete : If you check it, Record Period setup is activated.
If you specify the auto deletion period, the recording data before the period will be deleted automatically.
`` This option will be enabled only if Disk End Mode is set to <Overwrite>.
• HDD Free Space : Shows remaining free space available on the HDD.
• Recordable (days/hours) : Shows estimation of remaining days and hours for recording, based on the
remaining free space.
3. When the recording option setup is done, press <OK>.
60_ main menu
Setting the Event
You can set recording options for motion, and video loss event.
Motion Detection
You can set target detection region and motion, as well as the alarm signal output.
When the motion detection region is set, it detects motion within the area.
1. Press the [MENU] button on the remote control.
2. Use the left/right button (_ +) to select <Event>.
Event setting menu is selected.
Logout
Return
Event
Motion Detection
Video Loss Detection
Tampering Detection
Alarm Schedule
3. Use the up/down buttons (▲▼) in <Event> window to
move to <Motion Detection>, and press [ENTER] button.
A window of motion detection area setup appears.
Motion Detection
CH
4. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Mode : Sets whether to activate motion detection.
• Sensitivity : Sets the sensitivity level of the motion detection.
• Alarm : Sets the alarm output method.
`` For further information on alarm output, refer to “HDD Alarm >
Mode 
Sensitivity 
Alarm 
Alarm Duration 
1
OFF

Level10(High) 
None
10 sec

2
OFF

Level10(High) 
None
10 sec

3
OFF

Level10(High) 
None
10 sec

4
OFF

Level10(High) 
None
10 sec

5
OFF

Level10(High) 
None
10 sec

6
OFF

Level10(High) 
None
10 sec

7
OFF

Level10(High) 
None
10 sec

8
OFF

Level10(High) 
None
10 sec

Previous/Next Page
Motion Region
OK
Cancel
Alarm”. (Page 55)
• Alarm Duration : Sets the duration of alarm signal and alarm sound.
5. When the motion detection setup is done, press <OK>.
English _61
●● main menu
Using the mouse may help make setup easier.
main menu
Setting the Motion Detection Area
 Select <Motion Region>.
 When “Motion Region” window appears, select a
channel for detection and set the area of motion
detection.
• To set the area in “Motion Region” window
In the “Motion Region” window, select desired region
from <
>.
Motion Region
CH1
• To set the area using <Individual> selection
Individual
OK
Apply to All CH
Cancel
In the “Motion Region” window, you can select cells
individually by using <Individual>.
When selected <Individual>, “Motion Region” window disappears and you can select cells one by one.
When the motion area setup is done, press the <Menu> on the screen or the [MENU] button on the
remote control or front panel to display the “Motion Region” window again.
-- Select : Selected cell is set to be a part of motion detection area.
-- Unselect : Selected cell is removed from the motion detection area.
-- Inverse : Unselected cells are set to be the motion detection area.
-- Menu : After selecting individual motion areas, move to the “Motion Region” window.
`` If selected <Apply to All CH>, selected motion area is applied to all channels.
 When the motion detection setup is done, press <OK>.
62_ main menu
Select
Unselect
Inverse
Menu
Video Loss Detection
You can set the alarm to be generated on a camera disconnection, which causes a video loss.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Event> window to
move to <Video Loss Detection>, and press [ENTER]
button.
A window of video loss detection area setup appears.
Video Loss Detection
CH
Alarm Duration 

None

None
10 sec

3
OFF

None
10 sec

4
• Video Loss State : Sets whether to activate video loss
detection.
Alarm 
OFF
OFF
OFF
10 sec
None


10 sec

5
OFF

None
10 sec

6
OFF

None
10 sec

7
OFF

None
8
OFF

None
10 sec

10 sec

Previous/Next Page
Help
• Alarm : Sets the alarm output method.
OK
Cancel
`` For further information on alarm output, refer to “HDD Alarm >
Alarm”. (Page 55)
• Alarm Duration : Sets the duration of alarm signal and alarm sound.
3. When the video loss detection setup is done, press <OK>.
Tampering Detection
You can set to detect tampering attempts and trigger events, such as sudden change of camera’s framing
direction, blocked lens and other overall change of scenes from the video.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Event> window to
move to <Tampering Detection>, and press [ENTER]
button.
Tampering detection settings screen appears.
2. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Mode : Set whether to use Tampering Detection or not.
• Sensitivity : Set the sensitivity level of tampering detection.
• Alarm : Set the alarm output method.
Tampering Detection
CH
Mode 
Sensitivity 
Alarm 
Duration 
1
OFF

Medium

None
10 sec

2
OFF

Medium

None
10 sec

3
OFF

Medium

None
10 sec

4
OFF

Medium

None
10 sec

5
OFF

Medium

None
10 sec

6
OFF

Medium

None
10 sec

7
OFF

Medium

None
10 sec

8
OFF

Medium

None
10 sec

Previous/Next Page
OK
Cancel
• Duration : Set the alarm signal output and its dwell time.
3. When the tampering detection setup is done, press <OK>.
the tampering detection is designed and optimized to function in accordance with the user defined sensitivity level, it
MM `` Since
may not render a significant difference in detection with varied sensitivity in general monitoring situations.
`` When the tempering detection mode is set <ON>, it is recommended that the pre event recording time of the corresponding
channel should be set to 5 seconds or longer.
English _63
●● main menu
2. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
Video Loss State 
1
2
main menu
Alarm Schedule
You can set the conditions and operating hours for scheduled alarms.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Event> window to
move to <Alarm Schedule>, and press [ENTER] button.
2. Use direction buttons (▲▼_+) to move to a desired item,
and set the value.
• Alarm : Sets the alarm output method.
`` For further information on alarm output, refer to “HDD Alarm >
Alarm”. (Page 55)
Alarm Schedule
BEEP
All
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Hol
OFF
ON
Event Sync
• <ON> : Marked in orange, and always generates alarm on
scheduled time.
OK
Cancel
• <OFF> : Marked in white, no alarm is generated even if an event occurs.
• Event Sync : Marked in Blue, generates alarm only when an event occurs.
MM `` When the alarm is generated on the scheduled time, you can stop the alarm by canceling the schedule.
3. When the Alarm Schedule setup is done, press <OK>.
Backup
You can check the backup device and set the backup schedule by channel or by time.
The product only supports external HDD of USB memory and USB/SATA type. (Page 114)
Setting the Backup
You can backup the desired data to a connected device.
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control.
2. Use the left/right button (_ +) to select <Backup>.
Backup menu is selected.
Logout
Backup
Backup
64_ main menu
Return
3. Press the [ENTER] button.
A backup window appears.
You can directly access it from the “Live screen menu”.
(Page 31)
Backup
4. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Backup Range : Sets the <Start> and <End> time for the
backup.
 Start
2013-01-01 00:01:06
 Overlap
List0
ALL
 End
2013-01-01 08:25:45
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
 Device
USB-Storage
 Type
 Folder
\20130101\
 Filename
0001
OK
:
:
:
Change
Cancel
• Device : Select a backup device from the recognized devices.
• Type : Sets the backup data format.
-- DVR : Saved data can be played back only by the DVR.
-- SEC : Saves data in the Samsung’s proprietary format with built-in viewer, which supports immediate
playback on a PC.
• Filename : You can set the back file name.
`` Refer to “Using Virtual Keyboard”. (Page 42)
• Check capacity : Shows the size of the selected backup data, used and available capacity of the selected
backup device.
• Overlap : Shows a list of overlapping data on a same time according to the number of data.
It appears when one channel has multiple data on a certain time point due to changing of time or time zone
settings, etc.
`` Refer to time and time zone of “Setting the Date/Time/Language”. (Page 40)
5. When the backup setup is done, press <OK>.
`` If no available device is recognized for backup, <OK> button is not activated.
JJ `` The application may slow down during the backup.
`` You can switch to the menu screen during the backup in operation, but playback of data is not available.
`` When a memory device is used for backup, it is not available to use the full capacity of the media since the system
consumes a part of its capacity.
`` If backup has failed, select “Device > Storage Device” and check the free space of the HDD and check also if the HDD is
properly connected.
MM `` Pressing the <Exit> during the backup will return to the previous menu, while the backup progresses.
English _65
●● main menu
• Channel : Sets the channel to backup.
You can select multiple channels.
SEC
Backup
Used
Free
Check capacity
main menu
Network Configuration
It provides networked monitoring of Live screen from a remote place, and supports mail forwarding function with
events. You can configure the network environment which enables such functions.
Connection Mode
You can set the network connection route and protocol.
Setting the Connection
Sets the protocol and environment of the network.
Using the mouse may help make setup easier.
1. Press the [MENU] button on the remote control.
2. Use the left/right button (_ +) to select <Network>.
Network menu is selected.
Logout
3. Use the up/down buttons (▲▼) to move to <Connection
Mode>, and press [ENTER] button.
Return
Network
Connection Mode
DDNS
Live Transfer
Mailing Service
4. Select <Interface>.
A window of connection mode setup appears.
5. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• IP Type : Sets the network connection mode.
• Transfer Bandwidth : Sets the maximum data flow to be
transferred. (Upload speed)
Options will vary depending on the selected connection
mode.
Connection Mode
Interface
Port
 IP Type
Static
 Transfer Bandwidth
2Mbps
 IP Address
192.168.1.200
 Gateway
192.168.1.1
 Subnet Mask
255.255.255.0
 DNS
Manual
168.126.63.1
OK
Cancel
-- For <Static>, <DHCP> : Select one from 50 kbps ~
2Mbps, and Unlimited.
-- For <PPPoE>, select one from 50 kbps ~ 600 kbps.
you select <Unlimited> for <Transfer Bandwidth>, HD video is replayed more smoothly on the web viewer.
MM `` IfFreezing
may occur depending on the network condition.
66_ main menu
• IP Address, Gateway, Subnet Mask, and DNS
-- For <Static> : You can directly input IP Address, Gateway,
Subnet Mask and DNS.
-- For <DHCP> : IP Address, Gateway, and Subnet Mask
are set automatically.
-- For <PPPoE> : IP Address, Gateway, and Subnet Mask
are set automatically.
Interface
Port
 IP Type
PPPoE
 Transfer Bandwidth
600kbps
 IP Address
192.168.1.200
 Gateway
192.168.1.1
 Subnet Mask
255.255.255.0
 DNS
Manual
 ID
ID
 Password
************
168.126.63.1
OK
Cancel
●● main menu
• ID, Password : In case you selected PPPoE, provide the
“ID” and its “Password”.
Connection Mode
MM `` DNS server for <DHCP> and <PPPoE> can be set by user only if you selected <Manual>.
6. When the connection setup is done, press <OK>.
Setting the Port
1. Use the up/down buttons (▲▼) in <Network> window to
move to <Connection Mode>, and press [ENTER]
button.
2. Select <Port>.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Protocol Type : Select the protocol type between TCP and
UDP.
Connection Mode
Port
Interface
 Protocol Type
TCP
 Device Port
4520
 UDP Port
~
Unicast
 Multicast IP Address
224.126.63.1
 Multicast TTL
 HTTP Port
4524
8000 ~ 8160
 Unicast/Multicast
5
80
* Multi Browser Support:
Device Port 4505~4530, HTTP Port 80
-- TCP : If compared to UDP, TCP connection is more stable
but slow. Recommended for Internet connection.
OK
Cancel
-- UDP : If compared to TCP, UDP connection is less stable but fast. Recommended for use in LAN
environment.
`` If selected UDP, selections of Device Port, UDP Port and Unicast/Multicast are activated.
`` If setting the connection mode to PPPoE, you cannot select UDP for the protocol type.
• Device Port : Initially, <4520~4524> is set. It increases / decreases by 5.
-- TCP: It has better stability and lower speed when compared to UDP, and recommended for internet
environments.
• UDP Port : Initially, <8000~8160> is set. It increases / decreases by 160.
• Unicast/Multicast : Select one between UDP-Unicast and UDP-Multicast.
If selected Multicast, Multicast IP and TTL are activated.
-- UDP- Unicast : Transfers data packet to an individual client.
-- UDP-Multicast : Allows data communication to multiple clients causing no additional traffic to the network.
• Multicast IP Address : User can directly input.
• Multicast TTL : Select from 0 ~ 255. Initial value for the TTL is set to <5>.
• HTTP Port : Enter the port number for the Web Viewer. Initially, it is set to <80>.
• Multi Browser Support : The Web Viewer can be used with a browser that supports the Silverlight.
The multi viewer can be used only if the HTTP port is set to 80, protocol type is TPC and device ports range
within 4505-4530.
This is for the Siliverlight’s security purposes.
4. When the protocol setup is done, press <OK>.
English _67
main menu
Connecting and Setting the Network
Networking may differ from the connection method, check your environment before setting the connection mode.
When no router is used
• Static mode
-- Internet connection : Static PPPoE, leased line, and LAN environments allows connection between the DVR
and remote user.
-- DVR Network Settings : Set the <Connection Mode> in
<Interface> menu of the connected DVR to <Static>.
`` Consult your network manager for IP Address, Gateway and
Subnet Mask.
• DHCP mode
-- Internet connection : Connect the DVR directly to a cable
modem, DHCP PPPoE modem or FTTH network.
Connection Mode
Interface
Port
 IP Type
Static
 Transfer Bandwidth
2Mbps
 IP Address
192.168.1.200
 Gateway
192.168.1.1
 Subnet Mask
255.255.255.0
 DNS
Manual
-- DVR Network Settings : Set the <Connection Mode> in
<Interface> menu of the connected DVR to <DHCP>.
168.126.63.1
OK
Cancel
• PPPoE mode
-- Internet connection : An PPPoE modem is directly connected to the DVR, where the PPPoE connection
requires user ID and password.
-- DVR Network Settings : Set the <Connection Mode> in
<Interface> menu of the connected DVR to <PPPoE>.
`` <ID> and <Password> should be the same to the PPPoE user
information.
If you don’t know the ID and password, consult your PPPoE service
provider.
Connection Mode
Interface
 IP Type
Port
PPPoE
 Transfer Bandwidth
600kbps
 IP Address
192.168.1.200
 Gateway
192.168.1.1
 Subnet Mask
255.255.255.0
 DNS
Manual
 ID
ID
 Password
************
168.126.63.1
OK
68_ main menu
Cancel
When a router is used
JJ `` To avoid IP address conflict with the DVR's static IP, check followings :
• Setting the DVR with a static IP
-- Internet connection : You can connect the DVR to a router which is connected to an ADSL/Cable modem
or a router in a Local Area Network (LAN) environment.
1. Set the <Connection Mode> in <Interface> menu of the connected DVR to <Static>.
2. Check whether the set IP address is in the static IP range provided by the Broadband Router.
IP Address, Gateway, and Subnet Mask : Consult your network manager.
`` Check whether the set IP address is in the static IP range provided by the Broadband Router.
server is configured with starting address (192.168.0.100) and end address (192.168.0.200), you should set
JJ `` Ifthea DHCP
IP address out of the configured DHCP range (192.168.0.2 ~ 192.168.0.99 and 192.168.0.201 ~ 192.168.0.254).
3. Check the Gateway address and subnet mask are equal to those set in the Broadband Router.
• Setting the DHCP IP Address of the Broadband Router
1. To access the Broadband Router’s configurations, open a web browser on the local PC that is connected
to the Broadband Router and enter the router’s address (ex : http://192.168.1.1).
2. At this stage, make the local PC's windows network configurations to the below example :
Ex) IP Address : 192.168.1.2
Subnet Mask : 255.255.255.0
Gateway : 192.168.1.1
-- Once connected to the Broadband Router, it prompts with password. While entering nothing to the User
Name field, enter “admin” into the password field and press <OK> to access the router configurations.
-- Access the router’s DHCP configuration menu and set its DHCP server activation, and provide the start and
end address.
Set the start address (192.168.0.100) and end address (192.168.0.200).
MM `` Above steps may differ from the router devices depending on the manufacturer.
English _69
●● main menu
• Setting the DVR Network
main menu
• Setting Router’s Port Forwarding
1. Set the protocol to <TCP>.
2. External Port Range : Enter the TCP Port set in the
<Device Port> in <Port> menu of the connected DVR.
If more than one DVRs are connected to the router, the
TCP port can be different.
3. Internal PC IP Address : Enter the IP address set to the
<IP Address> in <Interface> menu of the connected
DVR.
Connection Mode
Interface
Port
 Protocol Type
TCP
 Device Port
4520
 UDP Port
~
Unicast
 Multicast IP Address
224.126.63.1
 Multicast TTL
 HTTP Port
4524
8000 ~ 8160
 Unicast/Multicast
5
80
* Multi Browser Support:
Device Port 4505~4530, HTTP Port 80
4. Internal Port Range : Set the same to the “External Port
Range”.
OK
Cancel
steps may differ from the router devices depending on the manufacturer.
MM `` Above
Port forwarding is required when you want to access the DVR connected to the router from outside of the router’s network.
DDNS
You can set the DDNS site for a remote user’s network connection.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Network> window to
move to <DDNS>, and press [ENTER] button.
DDNS Setup screen appears.
2. Use the virtual keyboard to enter the <Product ID>.
`` Refer to “Using Virtual Keyboard”. (Page 42)
DDNS
 DDNS Site
iPOLiS
 Server Name
www.samsungipolis.com
 Product ID
 Quick Connect
 DDNS Host Address
Not Used
Use
http://www.samsungipolis.com/
`` If selected <OFF> input fields are deactivated.
`` If selected <iPOLiS>, the server name field is disabled.
• DDNS Site : Set whether to use DDNS or not, and select
the DDNS site if enabled.
OK
Cancel
• Server Name : Enter the server name of the selected DDNS site.
• Product ID : Enter the product ID which was registered to the DDNS site.
• Quick Connect : Appears if the <DDNS Site> is set to <iPOLiS>.
To use this feature, connect the DVR to a UPnP router and set to <Use>.
MM `` If the quick connect setup has been cancelled while progressing, it is automatically set to <Not Used>.
3. When the DDNS setup is done, press <OK>.
70_ main menu
DDNS Setting
DDNS is a short form of Dynamic Domain Naming System.
DNS (Domain Name System) is a service that routes a domain name consisting of user friendly characters
(ex : www.google.com) to an IP address consisting of numbers (64.233.189.104).
DDNS (Dynamic DNS) is a service that registers a domain name and the floating IP address with the DDNS
server so that the domain name can be routed to the IP address even if the IP is changed in a dynamic IP
system.
• Setting DDNS in the DVR
●● main menu
Set <Protocol Type> in the <Port> menu of the connected DVR to the following :
Ex) Protocol Type : TCP
Device Port : 4520~4524
DDNS Site : iPOLIS
• DDNS Settings of the Router
Select the corresponding menu for the network transfer protocol of the router.
Live Transfer
Sets the quality of the image that is transferred from the DVR to the network.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Network> window to
move to <Live Transfer>, and press [ENTER] button.
The Live Transfer window appears.
2. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Resolution: Shows the selected network profile’s resolution
setting.
• Quality: Shows the selected network profile’s image quality
setting.
Live Transfer
CH
Resolution 
1
CIF

Low

2
CIF

Quality 
Low

3
CIF

Low

4
CIF

Low

5
CIF

Low

6
CIF

Low

7
CIF

Low

8
CIF

Low

Previous/Next Page
OK
Cancel
3. When the live transfer is done, press <OK>.
English _71
main menu
Mailing Service
You can send an e-mail to a DVR-registered user at a specific time interval, or if an event occurs.
an event occurs with a channel where the camera’s video is set to <OFF> or the remaining recording count is set to
MM `` If<OFF>,
only the text notification will be sent to the applicable email address.
you set the interval of the e-mail notice too short, the e-mail server may consider it as spam that will not be transferred
JJ `` Ifnormally.
SMTP Setting
Sets the SMTP mail server.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Network> window to
move to <Mailing Service>, and press [ENTER] button.
2. Select <SMTP>.
You will see the SMTP setting window.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• ServerType : Displays the connected server type.
• Server Address : Enter a server to connect to.
Mailing Service
SMTP
 ServerType
Event
 Port
25
Use Authentication
ID
Password
 Secure Transfer
Never
 Sender Address
• ID : Enter a user to use authentication when connecting to the SMTP server.
• Password : Enter the password of the SMTP server user.
• Secure Transfer : Select one from <Never> and <TLS (if available)>.
• Sender Address : Use the virtual keyboard to enter the sender’s e-mail address.
4. When the SMTP setup is done, press <OK>.
72_ main menu
ex. [email protected]
E-mail Test
• Use Authentication : Check this if the SMTP server uses user authentication.
The account input box will be activated.
• E-mail Test : Conducts the test on the server settings.
Recipient
 Server Address
• Port : Sets the communication port.
`` Refer to “Using Virtual Keyboard”. (Page 42)
Group
SMTP mail Server
OK
Cancel
Event Setting
You can set the interval and type of the event that will be sent to the user.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Network> window to
move to <Mailing Service>, and press [ENTER] button.
2. Select <Event>.
• Event Interval : Set the event interval.
SMTP
 Event Interval
Event
Group
Recipient
10 min
 Use Event Transfer
Motion
Tampering
Change P/W
HDD Info
Power On/Off
Manual Record
Video Loss
`` If a series of events occurs, the e-mail will be sent at the specified
interval, not on each event.
OK
Cancel
• Use Event Transfer : Select an event type to send if an event
occurs.
If the selected event occurs, the e-mail will be sent to the group that has the recipient authority.
4. When the event setup is done, press <OK>.
Group Setting
You can set the group to whom the e-mail is sent, and specify the permission for each group.
You can add recipients for each group in the <Recipient> menu item.
The recipient is set separately from the DVR user group.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Network> window to
move to <Mailing Service>, and press [ENTER] button.
2. Select <Group>.
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
• Add : Select <Add> and use the virtual keyboard to add a
group.
Mailing Service
SMTP
Group
Event
 Group
Add
Recipient
Delete
Rename
 Recipient Permission
Motion
Tampering
Change P/W
HDD Info
Power On/Off
Manual Record
`` Refer to “Using Virtual Keyboard”. (Page 42)
OK
Video Loss
Cancel
• Delete : Deletes the selected group.
• Rename : You can reset the recipient permission of an existing group.
• Recipient Permission : Set the permission of the recipient group.
4. When the group setup is done, press <OK>.
English _73
●● main menu
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
Mailing Service
main menu
Recipient Setting
You can add/remove a recipient(s) to/from the specified group and edit the group if necessary.
Using the mouse may help make setup easier.
1. Use the up/down buttons (▲▼) in <Network> window to
move to <Mailing Service>, and press [ENTER] button.
2. Select <Recipient>.
Mailing Service
SMTP
 Group
Event
Group
3. Use direction buttons (▲▼_ +) to move to a desired item,
and set the value.
Recipient
Group
All Group
Add
Name
e-Mail Address
Delete
Previous/Next Page
OK
• Add : You can select a recipient name, e-mail address or
group.
You should have created a group in the <Group> menu
item before you can add a user to the group.
`` For inputting the recipient name and email address, refer to
“Using Virtual Keyboard”. (Page 42)
4. When the recipient setup is done, press <OK>.
Mailing Service
SMTP
 Group
Event
Recipient
Group
ABC
Group
Add
Add recipient
Name
e-Mail Address
Delete
 Name
 Email
 Select Group
ABC
OK
Cancel
Previous/Next Page
OK
74_ main menu
Cancel
Cancel
Controlling a PTZ device
The DVR enables you to adjust the settings of a PTZ camera as well as an ordinary one to your preference.
PTZ Device
The PTZ device can be activated only if a channel in connection with the PTZ camera is selected.
Getting started with PTZ
`` Using the remote control buttons
Press the [PTZ] button on the remote control.
`` Using the launcher menu
Click <
PTZ
> to display the live launcher.
`` Using the right-click menu in Live mode
Right-click any area on the screen to display the context menu, and
select <PTZ Control>.
2013-01-01 01:10:25
Scene Mode 
PTZ Control
Zoom In
Audio
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
`` Using icons on the live screen
Click the <
> icon on the live screen.
2013-01-01 01:10:25
PTZ function is available only if the PTZ camera is connected
MM `` The
> icon is displayed on the screen.
so that the <
English _75
●● main menu
The PTZ camera is available, only if a channel is selected, in the following way :
main menu
Using the PTZ camera
You can use one camera to perform all functions of PAN, TILT and ZOOM for monitoring multiple places and
set the preset to your preference in a desired mode.
1. Launch the <PTZ Control> menu.
> icon on the bottom right corner turns
As the <
yellow, you access the “PTZ Control” mode to display the
“PTZ Control” menu.
configure PTZ working environments before operation,
MM `` BesincesurethetoPTZ
Working(Active) mark can be appeared to be
activated even when PTZ is not operative.
2013-01-01 01:10:25
PTZ Control CAM01
2. Use the PTZ wheel in the launcher menu to adjust the
monitoring area, or use the direction buttons (▲▼_ +) on
the remote control to move the camera to a desired place.
Swing
Group
Trace
Preset
Tour
Select
Select
Select
Select
Camera Setup
Select Preset
Save
Rename
Delete
Delete All
Exit
• PTZ Wheel : Clicking a nearer point to the center will move in that direction slowly; clicking a farther point
from the center will move fast.
`` Keep clicking left to rotate the lens counter clockwise; keep clicking right to rotate the lens clockwise.
• Zoom (
• IRIS (
• Focus (
) : You can use the Zoom function of the PTZ camera.
) : Adjusts the intensity of radiation incoming to the iris.
) : Enables you to adjust the focus manually.
• Swing : Moves between the preset start point and end point.
• Group : Moves in the path specified by combining the preset, pattern and auto pan.
• Trace : Moves camera’s framing in the predefined path.
• Preset : Sets the preset position for camera framing and moves to designated preset position when
selecting a desired preset.
• Tour : Moves in the path specified by combining multiple groups.
`` For the coaxial communications, the operation may differ depending on the protocol.
entering the PTZ device control mode, set the values of the PTZ device in the <Setting the PTZ> menu.
MM `` Before
(Page 52)
`` For camera specifications that supports PTZ comtrol depending on communication method, refer to our web site.
76_ main menu
Preset Setting
A preset is a set of specific target points of a PTZ camera, and up to 127 presets per a camera can be stored.
Using the mouse may help make setup easier.
1. In PTZ Control mode, use the direction buttons to adjust the camera in a desired direction.
2. Select the <Save> key.
The virtual keyboard for inputting the preset will appear.
• Save : You can add and save the preset.
• Rename : You can change the settings of the existing presets.
• Delete : Deletes the selected preset.
• Delete All : Deletes all existing presets.
MM `` If you replace the camera of the channel that stores the preset list with a new one, you should reset the preset accordingly.
3. Press <OK>.
The preset will be saved as a name that you entered.
Camera Setting
A PTZ camera has its own menu system. Optimize the PTZ camera according to the DVR.
Using the mouse may help make setup easier.
• Select <Camera Setup> in the PTZ Control menu.
The camera-specific menu appears.
2013-01-01 01:10:25
`` You can configure the settings of only those cameras that support
the protocols of Samsung, Pelco D/P, AD and Panasonic.
`` If you are setting Auto Pan or Pattern in the camera menu, press
and hold the appropriate button for a certain time so that the
button operation can be different from that in normal PTZ setting.
Camera Setup

Exit
English _77
●● main menu
`` Refer to “Using Virtual Keyboard”. (Page 42)
search & play
Search
You can perform the search for recorded data by the time or by the search criteria such as an event.
You can access the <Search> menu directly in Live mode.
1. In Live mode, right-click any area of the screen.
The Live menu appears.
2013-01-01 01:10:25
Scene Mode 
2. Select <Search>.
Or, press the [SEARCH] button on the remote control.
Audio Off
Freeze
Stop Alarm
Record
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
3. The Search menu appears.
2013-01-01 01:10:25
4. The search can be restricted by the Auto Delete function.
Refer to “Setting the Recording > Record Option”.
(Page 62)
Return
Time Search
data : It only appears if there exists overlapped data
MM `` Overlapped
on a certain time, produced due to the change of DVR’s time
Event Search
Backup Search
Motion Search
setup. The latest data comes first, from <List0>.
It does not appear in <Backup Search>.
Time Search
You can search for recorded data of a desired time.
As the time to display may be different depending on the time zone and the DST standard time, the time of
data recorded in the same time can be displayed differently depending on time zone and DST settings.
Using the mouse may help make setup easier.
1. Select <Time Search> in the <Search> menu.
2. Select a date to search.
Time Search
Go to First
2013-01-01
`` Refer to “Using the Calendar”. (Page 41)
3. The record data on the specific date will be listed.
The display bar is different according to the data type.
So check the data type for the color in the left pane.
4. Use direction buttons (▲▼_ +) to set the search criteria
and press the [ENTER] button.
Go to Last
Overlapped Data List1
Zoom In
All
Data
CAM 01
CAM 02
2013/01/01 00:01:17
Standard
Schedule
Motion
Etc
V.Loss
CAM 03
CAM 04
CAM 05
CAM 06
CAM 07
Previous/Next Page
Tampering
Play
Return
• Go to First : Moves to the earliest date.
• Go to Last : Moves to the most recent date.
• Time : Enter a time to perform the search or use the up/down button <>> to select one.
• Previous/Next Page : Moves to the previous / next page. (Use the remote control on the buttons.)
78_ search & play
Zoom Out
00:01
• Zoom In : The map enlarges in detail.
It will switch in the sequence of 24 hours - 16 hours - 8 hour
- 4 hours.
• Zoom Out : The map will switch in the reverse order of the
detailed mode above.
It will switch in the sequence of 4 hours - 8 hour - 16 hours
- 24 hours.
Go to First
Go to Last
Overlapped Data List1
Zoom In
Zoom Out
00:01
All
Data
CAM 01
CAM 02
CAM 03
2013/01/01 00:01:17
CAM 04
Standard
Schedule
Motion
Etc
CAM 05
CAM 06
CAM 07
V.Loss
Previous/Next Page
Tampering
Play
Return
●● search & play
MM
`` Double-click a desired time to zoom it in/out.
Time Search
2013-01-01
• Preview : Click <Channel> and select (click, drag) a time in
<Duration> to display a still image for the portion.
-- If the selected channel does not contain any recorded data, it will be marked black.
5. Select a data item and click <Play>.
The screen switches to the data playback mode.
Event Search
You can search for events by the channel and play them.
Using the mouse may help make setup easier.
1. Select <Event Search> in the <Search> menu.
2. Use direction buttons (▲▼_ +) to set the search criteria
and press the [ENTER] button.
`` All record events on a specific date will be found. (Normal/Schedule
Event Search
CAM 01
2013-01-01
Overlapped Data
View all
List1
Go to First
Date/Time Preview
3
02:47:54 ~ 02:48:59
Motion
2
00:39:06 ~ 00:40:30
Motion
1
00:01:22 ~ 00:02:28
Motion
recording included)
• Date/Time Preview : If you select a data item in the list, the
still image of the selected data will be displayed in the left
preview pane.
Go to Last
No.
Event
2013/01/01 00:01:22
Previous/Next Page
Play
• Event : Displays the type of the event that occurred.
Return
3. Select a data item and click <Play>.
The screen switches to the event data playback mode.
Backup Search
Searches for backup data in the connected backup device.
Only data in the format of DVR is included in the search.
Refer to <Type> in “Backup > Setting the Backup”. (Page 66)
Using the mouse may help make setup easier.
1. Select <Backup Search> in the <Search> menu.
2. Use direction buttons (▲▼_ +) to set the search criteria
and press the [ENTER] button.
Backup Search
USB:USB2FlashStorage
No.
Folder Name
File Name
1
20130101
16190000
• Record Period : Displays the record period.
• Channel info : Displays the recorded channel.
• Play Start Time : Select a time that you start playing.
3. Select a data item and click <Play>.
The screen switches to the backup data playback mode.
Previous/Next Page
 File Name
 Channel info
 Record Period
2013-01-01 01:01:01 - 2013-01-01 01:01:10
 Play Start Time
2013-01-01
Play
16:30:52
Return
English _79
search & play
Motion Search
If a motion is detected in each channel, you can set a desired area to perform the search.
You can use the mouse to select the related items.
1. Select <Motion Search> in the <Search> menu.
2. Use direction buttons (▲▼_ +) to set the search criteria
and press the [ENTER] button.
`` If you set the motion area to <Manual Area>, the <Setup> button
Motion Search
Channel
CAM 01
Date/Time
2013-01-01 03:41:18
Overlapped Data
Motion Region
List1
Go to First
No.
Start Time
7
01:01:30
6
01:01:25
5
01:01:20
4
01:01:15
3
01:01:10
2
01:01:05
1
01:01:01
will be activated.
• Motion Region : Select an area to perform the search.
Setup
All Area
2013-01-01 05:11:44
2013/01/01 01:01:30
-- All Area : Searches for all areas of the selected channel.
Search
Go to Last
Previous/Next Page
-- Current Area : Searches for the motion area for each
channel specified in “Motion Detection >
Setting the Motion Detection Area”. (Page 64)
Play
Return
-- Manual Area : You can set the motion area manually.
• Setup : The Setup button will be activated only if you have
set the motion area to Manual. Press this button to display
the area setting window.
• Date/Time : The Date/Time will be automatically set by the
hour, and the end time will be automatically set to one hour
later than the start time if it is set.
• Preview : Select a data item in the list to display the still
image of the item.
3. Select a data item and click <Play>.
The screen switches to the motion data playback mode.
80_ search & play
Motion Region
CH1
Individual
OK
Cancel
Apply to All CH
Playback
Play
You can play data stored in the HDD and backup a desired portion of the data.
Using the mouse may help make setup easier.
1. In Live mode, click <Play> in the right-click menu or
<
> in the launcher menu, or press the Play button on
the remote control.
2013-01-01 01:10:25
●● search & play
Scene Mode 
Audio Off
Freeze
2. Use the up/down button (▲▼) to select a menu.
Stop Alarm
Record
`` For data search, refer to <Search>. (Page 80)
Play
Search
Backup
Main Menu
Shutdown
Hide Launcher
Logout
3. Select a data item and click <Play> in the Search menu.
The selected data is played and the play launcher appears
on the screen.
2013-01-01 01:10:25
`` If there is an existing data, <Play> will start immediately without
performing the search.
• Playback Information : Displays the date and time of the
current data in the top corner.
REC
> to set the current time to the start
• Backup : Click <
time of backup; you can specify a backup area using the
mouse (yellow triangle).
> again to set the current time to the end time of
Click <
the backup and the “Backup Range” window appears.
-- Type : Supports formats of DVR and SEC.
Refer to a list of formats in “Setting the Backup”.
(Page 66)
-- Device : Select a backup device.
-- Check Capacity : Enables you to check the capacity of
the selected storage device.
4. If you want to return to the Live screen in Play mode, click <
[@] button on the remote control.
Backup Range
 Start
2013-01-01 00:01:06
 End
 Device
USB-Storage
 Type
 Folder
\20130101\
 Filename
2013-01-01 01:10:25
SEC
0001
Backup
Used
Free
Check capacity
OK
Change
:
:
:
Cancel
> in the launcher menu or press the
English _81
search & play
Using the Playback Button
REC
Part Names
a
b
c
d
e
f
g
h
i
Functions
Play Timeline
Indicates the current playback point, and can be used to move.
Backward Fast
Play
Used for quick backward playback.
Skip Backward
Moves backward by unit time.
Backward Slow
Play
Used for backward frame-by-frame search while in PAUSE.
Pause
Stops playing the current video temporarily.
Step Backward
Moves backward by one frame at a time.
Stop
Stops playback and moves to the live screen.
Step Forward
Forward Slow
Play
Moves forward by one frame at a time.
Ensured to play forward up to 4 channels simultaneously at a low speed.
`` In a split mode, the real time playback may not be supported, depending on the record quality,
resolution and number of channels. And some frame rates may be supported.
j
k
l
m
n
Forward Fast Play Used for quick forward playback.
o
Partial Backup
Begins backup of the selected section of the video being played, with the specified starting/ending
point.
p
Mode Switch
`` The grey area in the center of the 13-split mode plays the Live channel.
Skip Forward
Moves forward by unit time.
Audio
Sets Audio ON/OFF.
Return
REC
82_ search & play
Return to the search setup screen.
Records all channels in Live mode.
Click a desired playback mode or press [MODE] to switch the screen mode in sequence.
The default channel of the Live mode is CH1, which can be changed later.
web viewer
Introducing Web Viewer
What is Web Viewer?
Product Features
Network
• Remote access from a standard browser
• Supports PTZ camera controls
• Supports 1, 4, 9, 16 camera viewing formats (maximum of
16 cameras in the list).
• Gets JPEG format images to print and save to “Print or Save JPEG format images”.
• Record video in AVI format-compatible with popular media players. (needed the H.264 codec)
System Requirements
The following lists the minimum suggested hardware and operating system requirements needed to run the
Web Viewer.
Minimum
Recommended
CPU
Intel Core2 quad 2.5GHz
Intel i7 or higher
HDD
3GB or more
3GB or more
200GB or more
200GB or more
512MB or more
1GB or more
RAM
VGA memory
Resolution of display
OS
DirectX
Direct3D
Ethernet
IE
IE
1280x1024 or higher
Windows XP, Vista, 7
9.0c
Acceleration feature
10/100/1000 Ehternet NIC
32bit
7, 8, 9 (with the latest security patch and bug patch)
English _83
●● Web Viewer
Web Viewer allows remote access to your DVRs. You have
access to live video, archived video, PTZ control
(if configured), etc.
web viewer
Connecting Web Viewer (Windows)
1. Open your web browser and type the IP address or URL of
DVR into the URL address box.
MM `` “192.168.1.200” is set to IP by default.
`` Set to an available IP address in IP Installer or "Network >
Connection Mode”.
`` The URL connection will be enabled only when the DDNS connection settings have been completed.
2. A user with the admin permissions should provide the
admin ID and password. A registered user should provide
the user ID and password.
default password can be exposed to a hacking thread so
JJ `` The
it is recommended to change the password after installing the
product.
`` Set password for your wireless network if you use the product with a wireless router. Being not protected with
password or using the default wireless router password may expose your video data to potential threat.
`` Note that the security and other related issues caused by the unchanged password shall be responsible for the user.
up to 10 simultaneous access including the Admin and general users.
MM ```` ItIt allows
does not allow multiple login of the Admin user.
`` Initial password of the Admin user is set to “4321”.
`` Password of the Admin and general users can be changed in <Permission Management> menu of the DVR.
`` Normal users should have set <Viewer> under <Permission Management> to “Use” before connecting to the
Web Viewer. (Page 45)
`` All settings are applied by the DVR’s settings.
`` If you change such as the permission settings with logged in to the Web Viewer, you may go back to the log in
screen.
3. Click <Install ActiveX Control...>.
4. When the installation confirm message appear, click [Yes]
button.
84_ web viewer
5. When a program installation wizard window appears, press
the [Install] button to install the program.
●● Web Viewer
6. Open the Web Viewer after installing software, and log in
again.
Live Viewer's main screen appears when you log in
successfully after installing the program.
192.168.1.200 / SDR-5200
English _85
web viewer
Using Live Viewer (Windows)
The Live Viewer screen consists of following :
a
b
c
192.168.1.200 / SDR-5200
d
e
f
h
g
Menu
Functions
a
Menu Selection
Switches into corresponding menu screen by clicking each menu.
b
Address, Name, Time
Displays the IP, model name, time, etc. of connected DVR.
c
DVR Time, PC Time
Select <DVR Time> or <PC Time> for the OSD time information display setting of the
Live Viewer.
d
Split Mode Selection
Selects the type of split screen and specify the channel displayed in Display Pane.
e
Change Channel
Switches into previous/next channel or perform Auto Sequence.
Click Auto Sequence button to display the Time Interval Selection menu.
CAPTURE
PRINT
f
AVI Save
Audio
OSD
86_ web viewer
Saves current video for selected channel in designated path.
Prints current video image for selected channel through designated printer.
Records the live video in AVI file format in designated path, and then stops recording.
Recording status icon is displayed on screen during recording.
Sets the sound connected to each channel to ON/OFF.
Select the format of OSD information that will be displayed.
g
h
PTZ
Menu
Controls connect PTZ camera(s).
Functions
Menu
Goes to the relevant menu screen of a camera, which supports OSD menu and changes
the menu.
Display Pane
Displays the video of camera connected to DVR.
a The channel number of the connected DVR are displayed.
b Either the <DVR Time> or the <PC Time> will be displayed as the
current date and time, according to your configuration.
c It displays whether the PTZ controls are active.
d Shows Audio On/Off status.
e Alarm icon appears when alarm is issued.
It disappears when pressed the [ALARM] button of the DVR.
f Shows the recording status.
you have set PTZ cameras for the DVR, “PTZ” is displayed on the
MM `` Ifscreen.
Select a PTZ camera channel and use the [PTZ] button for
camera control.
a
cde
b
f
Connected DVR
This displays the IP address and the status of the connecting
DVR.
192.168.1.200 / SDR-5200
MM `` Connection failure message
No Response : Appears when the DVR does not respond.
Access Denied : Appears when the maximum number of
users is exceeded.
`` The number of simultaneous connections are limited to 10.
Setting the Display of the OSD Time Information
Select <DVR Time> or <PC Time> for the OSD time
information display setting.
• DVR Time : Based on the time of the connected DVR
• PC Time : Based on the time of the PC currently running
the Web Viewer.
192.168.1.200 / SDR-5200
English _87
●● Web Viewer
OSD Information Display
web viewer
Split-Screen
Click split mode selection button to switch to the
corresponding screen mode.
SINGLE MODE
QUAD MODE
To switch to full screen mode
Click <
>.
Current split screen appears in full screen.
Press the [ESC] key to exit the full screen mode.
88_ web viewer
NINE MODE
SIXTEEN MODE
Changing the Live Screen Mode
`` 16-split mode does not support “SEQUENCE”, “PREVIOUS” and
“NEXT”.
•
: When this button is clicked, the previous screen
appears.
-- In SINGLE MODE, the channel numbers are switched in
reverse order.
•
-- In NINE MODE, the screens are changed from 9 channels (1~9) to 7 channels (10~16).
: When this button is clicked, the next screen appears.
-- In SINGLE MODE, the channel numbers are sequentially switched from 1 to 16.
-- In QUAD MODE, the screens are changed like 1st 4 channels (1~4)  2nd 4 channels (5~8) 
3rd 4 channels (9~12)  4th 4 channels (13~16).
•
-- In NINE MODE, the screens are changed from 9 channels (1~9) to 7 channels (10~16).
: When this button is clicked, screens are switched at a
preset interval.
-- In SINGLE MODE, the channel numbers are sequentially
switched from 1 to 16.
-- In QUAD MODE, the screens are changed like 1st 4
channels (1~4)  2nd 4 channels (5~8) 
3rd 4 channels (9~12)  4th 4 channels (13~16).
-- In NINE MODE, the screens are changed from 9 channels (1~9) to 7 channels (10~16).
`` Preset interval (10 seconds)
To capture a screen
1. Click <
> button.
When a pop-up window appears, select the saving path
for captured image.
2. Select the path and name the file. And then click the
<Save> button.
3. Save current camera’s video image as .bmp, .jpg or .png
file.
viewer is running without the administrator’s permission
JJ `` Ifinthe
Windows Vista/7, you may not save the captured image as .bmp, .jpg or .png file.
English _89
●● Web Viewer
-- In QUAD MODE, the screens are changed like 1st 4 channels (1~4)  2nd 4 channels (13~16) 
3rd 4 channels (9~12)  4th 4 channels (5~8).
web viewer
To print a screen
1. Click <
> button.
2. Print current camera’s video image with the printer
connected to the PC operating the Web Viewer.
To save as AVI
1. Click <
> button.
When “AVI Setup” window appears, select the record
saving path and capacity.
2. Select a desired path, enter the maximum recording
capacity, and then click <OK>button.
`` Save current channel’s video as .avi file.For playing a video clip,
you can use the free video player to play the video.
(ex: GOM Player, KM Player, etc.)
`` After saving an AVI file, install the CODEC when playing it in Windows Media Player.
`` However, the video may not played properly, depending on the CODEC compliance of the player.
At least 1GB of free space is required for recording.
recording current data in Web Viewer, you cannot select Split Mode buttons, switch to the previous/next
JJ `` While
screen, or activate Auto Sequence function.
`` If the viewer is running without the administrator’s permission in Windows Vista / 7, you may not change a folder
Audio
•
when saving a video as AVI file.
: Sets audio of each connected channel to On/Off.
OSD
•
: Select Show OSD on the Live screen.
90_ web viewer
Controlling a Connected Network Camera
Controlling PTZ
If PTZ camera is connected, the <
> icon appears on screen. When selecting corresponding camera
channel, the PTZ tab is provided to allow you to control the PTZ.
●● Web Viewer
k
a
j
i
b
c
d
e
f
g
Part Names
h
Functions
a
b
Direction Adjustment
PT Speed
Adjusts the PAN, TILT reaction speed.
c
Preset
Sets the preset position for camera framing and moves to designated preset position
when selecting a desired preset.
d
e
f
g
h
i
j
k
Swing
Moves between the preset start point and end point.
Group
Tour
Trace
PowerPTZ
FOCUS
IRIS
ZOOM
Adjusts the direction of a camera.
Moves in the path specified by combining the preset, pattern and auto pan.
Moves in the path specified by combining multiple groups.
Moves camera’s framing in the predefined path.
Click or drag on the screen to control PTZ.
Adjusts the focus of the camera.
Adjusts image’s brightness by controling the camera’s iris.
Zooms in/out the image by controling camera’s zoom.
English _91
web viewer
To set a preset
1. Click <
2. Click <
> button to display “Preset” window.
> to select a desired preset number.
3. Enter the name of preset.
4. Use direction keys to adjust the direction which camera
aims at.
5. Click the <RECORD> button.
To activate the preset
1. Click <
> button to display “Preset” window.
2. Select a desired preset to activate from the list.
The camera’s framing moves to the preset position.
To activate Swing, Group, Tour and Trace
You can activate listed functions in the same manner as using a preset. For more information, refer to
corresponding user manul of applicable camera.
MM `` Only selective functions of the camera can be supported, depending on camera.
92_ web viewer
Controlling OSD Menu
If connected network camera supports the OSD menu, press the <
to change its settings.
> to enter camera’s menu screen
Part Names
a
b
●● Web Viewer
b
a
Functions
Direction Adjustment
You can go to a desired menu.
ENTER
Selects a desired item.
Menu On/Off
You can On/Off camera’s OSD menu settings.
MM `` For more information about camera’s OSD menu, refer to corresponding user manul of each camera.
English _93
web viewer
Using Search Viewer
The Search Viewer screen consists of following :
`` Up to 3 users can access simultaneously.
a
b
192.168.1.200 / SDR-5200
c
d
e
i
f
g
h
Menu
Functions
a
Menu Selection
Switches to the corresponding menu screen by clicking each menu.
b
Address, Name, Time
Displays the IP, model name, time, etc. of connected DVR.
c
Split Mode Selection
Selects the type of split screen and selects the channel displayed in Display Pane.
CAPTURE
Saves current video for selected channel in designated path.
AVI Save
Records and saves currently playing video image as AVI filie in designated path and then
stops.
PRINT
d
Audio
OSD
Prints current video image for selected channel through designated printer.
Sets the sound connected to each channel to ON/OFF.
Select the format of OSD information that will be displayed.
e
Calendar
Displays the video-recorded date in blue and today in white. Click the date in blue color
to display the recorded video information in timeline.
f
Overlapped Data
Displays and zooms in/out recorded video data. If overlapping data found, this function
selects one of them to play.
94_ web viewer
Menu
Functions
g
Play Control
Adjusts current video’s playback speed and played time position.
h
Recording Color
Displays the corresponding color depending on recorded data type if you place your
mouse cursor on that area.
i
Display Pane
Plays corresponding data on the screen if you select a search result.
●● Web Viewer
Searching the Recorded Video in the Calendar
Dates having recorded video are marked in blue.
Click a date marked blue to display video information on the
timeline. When you click <
>, it will be synchronized
with the system time (date) of the current PC.
To search by date
You can select the search date by using calendar.
1. Click <
> or <
> to select the year to search.
> or <
> to select the month to search.
2. Click <
The date including data appears in blue and today
appears in red.
3. Click the date to search in calendar.
The first image of searched video data on the date is displayed on screen and the data is displayed in the
timeline.
4. To search video data on today, click <
Today’s date is selected.
>.
To adjust timeline
If searched data are overlapping, you can select a desired data, move its playback time point, and zoom in/
out the timeline.
1. Select the number of data to search if data is overlapping.
It appears only when data are overlapped and assigns <0> to the most recent data.
2. Click your desired time point to play on the timeline.
The playback start point is moved.
3. Click <
>, <
> to zoom in/out the zoom factor to display time.
4. To show the previous/next timeline in zoomed-in status, click <
> or<
> to go to the left or right.
English _95
web viewer
Names and Functions of Play Buttons
a Moves backward by 10 minutes from the current playing
point.
a
b
c
d
e
f
g
h
i
j
k
l
b Plays in reverse at doubled speed. The playback speed is
doubled up to x64 speed.
c Moves backward by 1 second from current playing point.
d Moves forward by 1 second from current playing point.
e Plays at doubled speed. The playback speed is doubled up to x64 speed.
f Moves forward by 10 minutes from the current playing point.
g Moves to the recording start point on the corresponding timeline.
h Plays in reverse.
i Stops playing. When resuming playback, it is played from the recording start point.
j Pauses playing. When resuming playback, it is played from the stopped point..
k Plays normally.
l Moves to the recording end point on the corresponding timeline.
96_ web viewer
Viewer Setup
You can configure the DVR settings remotely on the network.
To configure the DVR settings, click <Setup>.
System
You can configure the various settings of the DVR system.
For more information, refer to <Date/Time/Language> in the <System Setup> menu. (Page 40)
1. Select <Date/Time/Language> in the System menu.
2. Configure the DVR settings according to your system environment.
• Date/Time
Set the date and time.
• Time Synchronization Setup
Set the time synchronization.
• Display
Date Format : Set the date type.
Time : Select a time format to display on the screen.
• DST (Daylight Saving Time)
DST is displayed an hour ahead of the standard time of the time zone.
• Language
Select a preferred language for the DVR.
English _97
●● Web Viewer
Date/Time/Language
web viewer
Holiday
You can set specific dates to Holidays according to your preferences.
For more information, refer to <Setting Holiday> in the <System
Setup> menu. (Page 41)
Permission Management
For more information, refer to <Permission Management> in the <System Setup> menu. (Page 42)
• Admin
You can change the admin ID or the password.
`` You can type the ID with alphanumeric characters only.
`` For the password, use alphabets and special characters excluding <\> and
<">.
• Group
Users are classified into groups and the permission can be
set according to the group.
`` First of all, add a group.
98_ web viewer
• User
You can add, change or remove a user or users.
●● Web Viewer
• Setup
You can set the user permission.
System Management
For more information, refer to <System Management> in the <System Setup> menu. (Page 46)
• System Information
You can see information of the current system.
Check the Software Version, Broadcast Format and MAC Address.
English _99
web viewer
Device
You can check a list of devices that are connected to the DVR and configure the necessary settings.
Click <Device> in the menu screen.
For more information, refer to “Setting the Device”. (Page 50)
Camera
• Camera
You can configure the settings of the camera that is connected to the
DVR.
• Privacy Region
You can specify a certain area of the camera video to be protected for
your privacy.
• PTZ
You can configure the settings of the PTZ camera that is connected to
the DVR.
Set the ID and protocol.
100_ web viewer
Storage Device
You can check and change the settings of the storage device.
• Device
You will see a list of storage devices that are connected to the DVR.
You can check the type, used/total, usage and status of the device.
●● Web Viewer
• HDD Alarm
You can set the alarm output channel and the alarm duration for an
error.
Remote Device
You can see a list of remote devices including PTZ cameras and
system keyboards that are connected to the RS-485 port of the DVR
and configure the necessary settings.
English _101
web viewer
Monitor
• Monitor
You can configure the monitoring screen settings and set the output
system.
• Mode
You can switch between live mode and play mode.
102_ web viewer
Record
For more information, refer to <Setting the Recording>. (Page 60)
Recording Schedule
If you set a recording schedule for a specific date and time, the
recording will start at that specific time.
●● Web Viewer
-- Apply to All CH : Click <Apply to All CH> to display the
confirmation window.
Event Record Duration
You can set the start and end times of recording that will be activated
if an event occurs.
English _103
web viewer
REC Quality & Resolution
• Standard/Event
You can set the resolution, frame rate and recording quality for each
channel.
Record Option
You can set the Disk End Mode.
Event
For more information, refer to <Setting the Event>. (Page 63)
Motion Detection
You can set the motion detection mode and the sensitivity
as well as the alarm output type and the duration.
104_ web viewer
• Motion Region
Set the target motion detection area
●● Web Viewer
Video Loss Detection
You can set the alarm output time if a video loss occurs.
Tampering Detection
You can set whether to generate alarm and its dwell time for video
tampering events.
English _105
web viewer
Alarm Schedule
You can schedule the alarm output according to the day of the week
and the time.
The default setting is Event Sync, which activates the alarm only if an
event occurs.
Network
For more information, refer to <Network Configuration>. (Page 68)
Connection Mode
A remote user can access the DVR via the network to check the current mode and the IP address.
• Interface
You can set the network connection route.
• Port
You can configure the protocol related settings.
106_ web viewer
DDNS
You can check the DDNS settings.
●● Web Viewer
Live Transfer
You can set the network camera’s network transfer settings.
• Live Transfer
A remote user can set the image resolution of the transferred data.
Mailing Service
You can specify the SMTP server that sends a mail if an event occurs and set the recipient group and users.
• SMTP
You can set the server that sends mails and specify if you use the
authentication process.
• Event
You can set the event interval and specify which events the server
sends mails for.
English _107
web viewer
• Group
You can add a group to receive the mail if an event occurs and set the
permission to receive the event mail for each group.
• Recipient
You can add a user or users who will receive the mail.
About
Click <ABOUT>.
Displays the model name of connected DVR and the version of Web Viewer.
108_ web viewer
Connecting Web Viewer (Mac)
Safari on MAC.
If you want to use SRD-Series DVR Web Viewer with Safari Browser on a Mac, please refer to this user guide
and install Multi Viewer with firmware upgrade if necessary.
• Mac OS versions available: 10.6 or later version
• Silverlight: 5 or later
●● Web Viewer
1. Click [Click now to Install] to display the installation
screen as shown.
2. Double-click the [Silverlight.pkg] icon to display the
Silverlight plug-in installation screen as shown.
3. Click [Continue] to start installing Silverlight plug-in.
When done, you will see the screen as below.
4. Click [Close] to exit from the Silverlight plug-in installation
screen.
English _109
web viewer
• If Microsoft Silverlight plug-in is already installed
1. Use a web browser to connect to the DVR.
2. If Silverlight plug-in is already installed, you will see the
login screen as shown.
3. If the login screen does not appear, check if the DVR set is
connected properly with a valid IP address.
proxy is activated and an invalid DNS server is specified while configuring network, the Internet access
MM `` Ifmayautomatic
not be available.
`` For more details on using the Web Viewer, please refer to “Connecting Web Viewer.” (Page 88)
Using Live Viewer (Mac)
The Live Viewer screen consists of following :
b
a
c
d
e
f
g
h
192.168.1.200 / SDH-P5080
192.168.1.200 / SDH-P5080
i
k
j
Menu
Functions
a
b
Name, Address
Displays a connected DVR’s IP address and model name.
Menu Selection
Consists of <LIVE> and <ABOUT> menu.
c
Split Mode Selection
`` Supports up to a maximum of 9 channels due to performance constraints of Silverlight
110_ web viewer
These buttons are used for the screen split and full screen mode.
Menu
Functions
Address, Name
Displays a connected DVR’s IP address and model name.
Audio
Sets the sound connected to each channel to ON/OFF.
f
DVR Tim, PC Time
Select <DVR Time> or <PC Time> for the OSD time information display setting of the Live
Viewer.
g
Change Channel
Switches into previous/next channel or perform Auto Sequence.
Click Auto Sequence button to display the Time Interval Selection menu.
CAPTURE
Saves current video for selected channel in designated path.
h
i
j
k
PRINT
Prints current video image for selected channel through designated printer.
RECORD
Starts and stops recording.
If you cannot play the file recorded from the web, please install the H.264 CODEC.
ex) MAC: perian_1.2.3.dmg (http://perian.org)
Channel
Indicates connected DVR's channels.
PTZ
Controls connect PTZ camera(s).
Display Pane
Displays the video of camera connected to DVR.
English _111
●● Web Viewer
d
e
web viewer
Mobile Viewer
What is Mobile Viewer?
Mobile Viewer is management software that enables you to connect
to DVR (Digital Video Recorder) remotely and control the video
playback and PTZ operations (if confi gured) in real time.
Key Features
Remote access via Smart phone
Voice Recognition
1-split and 4-split modes supported in Live Viewer
Supports single channel search function
Switch channels using the touch-sensitive LCD panel
PTZ camera operations supported
(complies with the protocol of the connected DVR)
• Up to 16 channels supported
•
•
•
•
•
•
Compatible Smartphone
This application is optimized for
• iPhone OS v4.3.5, v5.1.1
• Android 2.3.x, 3.2, 4.0.1 (Galaxy S2 is recommended)
more information, refer to the user manual.
MM `` For
(http://www.samsungcctv.com)
112_ web viewer
2.X
20xx. xx. xx
backup viewer
SEC Backup Viewer
You can play a file that is backed up in the format of SEC.
Backup in SEC format produces backup data file, library file and self-executable viewer file.
a
b
j
c
i
●● Backup Viewer
If you run the backup file viewer, the backup data file will be automatically played.
d e f
hg
Recommended System Requirements
PCs with a lower specification than the recommended below may not fully support forward/backward and
high-speed playback.
•
•
•
•
OS : Windows XP professional, Windows Vista, Windows 7
CPU : Intel i5 2.8GHz or faster
RAM : DDR PC-3200 1G or more
VGA : Geforce 6200 or higher
English _113
backup viewer
Part Names
a
b
Functions
Set the screen’s aspect ratio to be displayed.
Split Screen
The screen switches to the selected split screen mode.
Saves the current video’s image as in an image file. Supports JPEG file format.
Screen Printout
Prints out the current screen. You should have installed the appropriate printer
driver before you can print out the screen.
/
A toggle button. Each time you press this button, the audio output will toggle
between activated and deactivated.
c
Audio
d
Watermark
e
Deinterlace
You can enable the De-interlace function.
Show OSD
Check the OSD checkbox to display the OSD information on the backup
playback screen.
Information such as backup date, day of the week, time, model name, and
channel number will be displayed on the screen.
f
g
Enlarge /
Reduce Timeline
h
Restore Timeline
i
j
You can adjust the volume level from 0 to 100.
/
Display of storage time range
Playback Control
Press the button to enable file tampering detection, to detect data file forging.
Collapses the time range that is displayed on the range bar of the storage
time. You can collapse the range bar until the overall range is shortened to
24 hours.
Enlarges the time range that is displayed on the range bar of the storage
time. You can enlarge the range bar until the overall range is extended to
1 minute.
Restores the timeline to the default.
Displays the time range of a stored video file.
You can move the gridline of the range bar to select a time point to play.
You can adjust the video playback of the timeline.
it has a high recording rate and is played at high speed playback of 16x or higher speed in the backup viewer,
MM `` Ifactual
playback speed may not reach the set playback speed.
114_ backup viewer
appendix
Product Specification (Camera)
Input Voltage
Power Consumption
Video
Details
DC 12V(by PoE) (일반 PoE와 호환 안됨)
3W
Imaging Device
1/4 CMOS
Scanning System
Progressive
Total Pixels
Synchronization
Min. Illumination
S/N Ratio (Y Signal)
UTP
카메라 연결 시간
Lens
1280 x 720(720p) 이상
Internal
OLux (IR-LED)
39dB
Built-in UTP TX
Maximum Transmission Length : 1 00m (UTP CAT5e, Solid Wire(단선))
50m (UTP CAT5e, stranded wire(연선))
일반 3 ~ 6 초
`` 케이블의 종류와 상태에 따라 카메라의 영상이 나오는 시간이 더 오래 걸릴 수 있습니다.(10초
이상)
Focus Length
3.1mm
Angular Field of View
D: 86˚ 이상
Max.Aperture Ratio
Operational
Shutter Mode
2
Auto(Rolling Shutter)
Gain Control
Auto
WDR
N/A
White Balance
Sharpness
Auto (1,800K ~ 10,000K)
Contrast
N/A
Flickerless
Auto
Day & Night
Auto
Brightness
Digital Noise Reduction
IR Distance
●● APPENDIX
Electrical
Item
Auto
25m
English _115
appendix
Item
Details
Environmental
Operating Temperature/
Humidity
-10°C ~ +50°C / 90%
Weatherproof
IP66
Weight
330g
Mechanical
Dimension (W x H x D)
Design type
116_ appendix
70.76 x 70 x 200 mm(Bracket 포함)
Box Camera
Product Specification
Item
Operation System
HD: 1080P/720P, SD: 4CIF
Channel
Connector Type
Loop Through
Composite
Video Out
S-Video
VGA
HDMI
Simultaneous Out
Audio In
Audio Out
Channel
Connector Type
Channel
Connector Type
Video
Compresstion
Audio
Codec Type
Dual Codec
Live
SDH-P4080, SDH-P4040
Resolution
Split Mode
Live/REC/PB/NW
16CH(4CH HD, 12CH SD)
8CH(4CH HD, 4CH SD)
UTP(HD) x 4CH, BNC(SD) x 12CH
UTP(HD) x 4CH, BNC(SD) x 4CH
X
X
X
MAX 1080P(60Hz)
MAX 1080P(60Hz)
MAX 1080P(60Hz)
MAX 1080P(60Hz)
VGA and HDMI
4
RCA
1
RCA
H.264
G.711
H/W
O
1080P/720P/960H
1/4/8/9/13/16/PIP
1/4/8/9/13/PIP
English _117
●● APPENDIX
Video In
SDH-P5080, SDH-V5100, SDH-V5120
Embedded LINUX
Input Video Format
Operation Mode
Details
appendix
Item
Resolution & Frame
Rate
Quality Level
Recording
HD : 1080p(MAX 120fps),
720p(MAX 120fps)
SD : 960H (MAX 360fps)
SDH-P4080, SDH-P4040
HD : 1080p(MAX 120fps),
720p(MAX 120fps)
SD : 960H (MAX 120fps)
8Level(LV1~LV8)
REC Mode
Function
1. Channel 별 설정 분리
- Resolution
- Frame Rate
MAX 1080P: 30fps, 720P: MAX 60fps,
SD: MAX 360fps
MAX 1080P: 30fps, 720P: MAX 60fps,
SD: MAX 120fps
Search Mode
1. Time Search
- Date/Time
- Go to First/Go to Last
- Calendar
- Time Bar
2. Event Search
- Motion/Alarm/Video Loss
3. Backup Search
- USB Memory
- USB External HDD
Tric Mode
1. Play/Pause/Stop
2. Fast Forward/Backward
- x2/x4/x8/x16/x32/x64
3. Slow Forward/Backward
- x1/2, x1/4, x1/8
4. Step Play
- Forward : I+P frame
- Backward : I frame
Intetnal
1. Max Capacity : 2TB
2. Install HDD : 1EA
3. Packing : 1TB: SDH-P5080
2TB: SDH-V5100, SDH-V5120, SDH-P4040, SDH-P4080
External
1. USB 2.0 I/F
2. E-SATA
3. Max Capacity : 2TB
Playback
118_ appendix
SDH-P5080, SDH-V5100, SDH-V5120
1. Normal REC
2. Schedule REC
3. Event REC
- Motion/Alarm/Video Loss
4. Pre REC
- Off/5sec
5. Post REC
- 5/10/20/30sec
- 1/2/3/5/60min
6. Time Laps REC
- 1,2,3,.., 29,30 fps
Resolution & Frame
Rate
Storage
Details
1. USB 2.0 I/F
2. E-SATA
3. Max Capacity : 2TB
Item
Backup
1. USB 2.0
2. Memory : Max 32G
3. External HDD : Max 1TB
Format
1. SEC
2. DVR
Connection No
Connection Mode
Protocol
Webviewer
Mobile
Function
I/F
Protocol
Intelligent Video
Tampering
Control
Mouse
Camera 제어
10/100 Mbps Ethernet
SDH-P4080, SDH-P4040
10/100 Mbps Ethernet
4CIF/640*360 120fps (Web), CIF/320*180 480fps (Web)
4CIF/640*360 16fps (Mobile), CIF/320*180 16fps (Mobile)
10 (Admin 1 + User 9)
1. Static IP
2. Dynamic IP
3. ADSL
TCP/IP, DHCP, PPPoE, SMTP, NTP, HTTP, DDNS, RTP, RTSP, UPnP
IE, Safari, Chrome, Firefox
iPOLiS Mobile
1. Quality
2. Bandwidth
- Unlimited/2/1.5/1M
- 800/600/500/400/300Kbps
- 128Kbps
3. TCP/UDP Port
4. Unicast/Multicast
5. Webviewer Port
6. DDNS
- Samsung iPOLIS DDNS
- dyndns.com
- no-ip.com
- changeip.com
7. Mailing Service
RS-485 Half Duplex
SAMSUNG-T, VICON, PANASONIC,AD, PHILIPS, PELLCO D, PELLCO P, SAMSUNG-E, GE
지원
Jog & Shuttle
X
Remocon
Samsung Remocon
USB I/F
I2C
English _119
●● APPENDIX
Transmit Speed
PTZ Control
SDH-P5080, SDH-V5100, SDH-V5120
USB
Network
Remote Viewer
Details
appendix
Item
USB
RS-485
In/Out
RS-232C
E-SATA
Alarm In
Alarm Out
Language
OSG
The Other Function
Power Type
Electrical
Power
Input Voltage
Operation Condition
Dimensions (WxHxD)
Net Weight
Mechanical
120_ appendix
Packing List
Details
SDH-P5080, SDH-V5100, SDH-V5120
2
SDH-P4080, SDH-P4040
O
X
O
X
X
Korean, Japanese, Chinese (Simplified), English, French, German, Spanish (유럽),
Italian, Russian, Polish, Czech, Turkish, Netherlands, Portuguese (미주향),
Swedish, Danish, Thailandais, Rumania, Serbia, Croatia, Hungary, Greek, Chinese
(Traditional), Finnish, Norwegian (25 Language)
1. Tool Bar
2. Pop Menu
3. S/W Upgrade
- USB
4. Live & Network Monitoring without HDD
Adaptor(12V DC)
MAX 40W(DVR + HD CAM 4EA)
100 ~ 240VAC
Temperature 0~40, Humidity 20~85%RH
TBD
TBD
1. LAN Cable
2. Power Cord
3. Remocon
4. Mouse(Included Camera)
5. Quick Guide
6. CD(User Manual, Quick Guide, Router Guide)
7. Cushion
8. PE Back
Product Overview
• SDH-P4080/SDH-P4040
unit : mm (inches)
●● APPENDIX
English _121
appendix
• SDH-P5080/SDH-V5100/SDH-V5120
122_ appendix
unit : mm (inches)
Default Setting
This returns the factory default settings.
The settings are made as follows;
• Use System/Load Factory Default in MENU
`` The default settings are based on SDH-P5080.
`` The default password can be exposed to a hacking thread so it is recommended to change the password after installing the product.
Note that the security and other related issues caused by the unchanged password shall be responsible for the user.
Details
Date
Time Format
Date/Time/Language
Date/Time/Language
Time Zone
Time Synchronize
DST
System Settings
Admin
Permission
Management
User
Setting
System Management
System Information
Camera
Camera
Device
Screen Setup
Storage Device
HDD Alarm
YYYY-MM-DD
24 hours
GMT
OFF
OFF
Language
English
New Password
4321
ID
Group
admin
All Group
Restricted Access
Search/Backup
Manual Input of ID
OFF
Auto Logout
Broadcast Format
Video
Audio
OFF
NTSC/PAL
ON
OFF
CH Name
CAM 01 ~ CAM 16
ID
Camera No.
Brightness
50
SEQ-Dwell Time
PTZ
Factory Default
Protocol
Contrast
Color
5sec
None
50
50
Check Alarm Output Port
OFF
Replace Alarm Output Port
OFF
Duration
Duration
OFF
OFF
English _123
●● APPENDIX
Category
appendix
Category
Details
Baudrate
Remote Device
Monitor
Event Record Duration
Monitor
CH1~CH16
Event
Disk End Mode
Auto Delete
Mode
Video Loss Detection
Alarm Schedule
124_ appendix
Display
Multi CH SEQ Time
OFF
All
5 sec
VGA/HDMI
1280X1024
Play Screen
ALL
Live Screen
ALL
Both(Cont&Evnt)
OFF
Resolution
Frame Rate
1 min
CIF
7fps
Record Quality
Level 4
Frame Rate
7fps
Resolution
Record Quality
Setup
Disk End Beep
4CIF
Level 4
Overwrite
OFF
OFF
OFF
Level10(high)
Duration
10 sec
Alarm
Video Loss State
Alarm
None
All Area
OFF
None
Duration
10 sec
Sensitivity
Medium
Mode
Tampering Detection
Event Display
ON(00)
Sensitivity
Motion Region
Event
1
PRE Event
POST Event
REC Quality/Resolution
Motion Detection
8
Stop bit
Normal Recording
Record Option
None
Data
Mode
Recording Schedule
9600
Parity
Remote Control
Device
Recording
Factory Default
Alarm
Duration
BEEP
OFF
None
10 sec
Event Sync
Category
Details
IP Type
Transfer Bandwidth
Interface
Connection Mode
DDNS
Live Transfer
DDNS Site
SMTP
Mailing Service
192.168.1.200
Subnet Mask
255.255.255.0
Gateway
Protocol Type
Device Port
HTTP Port
Resolution
Quality
Group
192.168.1.1
168.126.63.1
TCP
4520~4524
80
OFF
CIF
Server
Port
Use Authentication
Secure Transfer
Event
2Mbps
Low
OFF
25
OFF
Never
Event Interval
10 min
Group
OFF
Use Event Transfer
Recipient Permission
OFF
OFF
English _125
●● APPENDIX
Network
Static
IP Address
DNS
Port
Factory Default
appendix
Troubleshooting
Symptom
Countermeasures
The system does not turn on and the indicator on the
front panel does not work at all.
yy Check if the power supply system is properly connected.
yy Check the system for the input voltage from the power source.
yy If the problem persists even after you have taken the above actions,
check the power supplier and replace it with a new one if neccessary.
Some channels display just a black screen even if
they receive video sources.
yy Check if the camera connected to the system properly displays the
image. Sometimes, this problem may occur on a camera that is not
properly connected to the video source.
yy Check if the camera is properly supplied with power.
yy Sometimes, this problem may occur on a channel with weak video
signal from a video distributor that is connected to multiple systems. In
this case, input the video source of the camera directly into the DVR.
This may find the cause and solve the problem.
If I press the [REC] button, the REC indicator does
not flash, nor the player start recording.
yy Check if there is a free space on the HDD for the recording.
yy Check if the record mode is set to ON in the record mode setting.
The screen displays the logo image repeatedly.
yy This may occur from a problem with the main board, or the related
software is corrupt.
Contact the nearest service center for more information.
The Channel button does not work on the Live
screen.
yy The Channel button does not work if the current screen is in the event
monitoring mode.
In the event monitoring screen, press the [ALARM] button to exit the
screen and select a channel.
The cursor will not move to the Start button when I
start the calendar search.
yy Check if the channel and the date that you want to play are marked
with the V symbol.
Both channel and date should be checked before you can start playing
with the Start button.
When the alarm sounds, I press the [ALARM] button
to release the alarm but it does not work. The alarm
persists and I could not set it off in any way.
yy Press the [MENU] button to release the alarm in the following way:
1) To release the event monitoring mode : Monitoring Mode – set the
duration of the event monitoring to Off.
2) To release the alarm sound : Event Record Mode - Alarm (Motion
Detection/Video Loss/Tampering Detection) – deactivate the alarm
sound.
3) To release the event : Event Record Mode - Alarm (Motion Detection/
Video Loss/Tampering Detection) – set the mode to Off.
No response is made even if I press the [PTZ] button
on the Live screen.
yy Menu  Camera  Check if the current protocols and other settings
in the PTZ device are properly configured according to the PTZ camera.
I've found that the DVR does not recognize as many
disks as installed when I have connected multiple
external HDDs to the DVR.
yy It takes time for the DVR to recognize multiple external HDDs. Try again
in a moment and if the problem (of failure to recognize as many HDDs
as connected) persists, it may occur due to a mechanical error of the
HDD installed. Try again with a different HDD.
126_ appendix
Symptom
Countermeasures
yy This message is displayed if there occurs a problem with the time
setting of the internal clock or an error in the clock itself.
Contact the retailer or the service center for more information.
The time bar is not displayed in Search mode.
yy The timeline can switch between normal and extension mode.
In extension mode, the time bar may not be displayed in the current
timeline. Switch to normal mode or use the left or right button to
navigate through the time bar.
The “NO HDD” icon and an error message are
displayed.
yy Check the HDD for connection. If the problem persists in a normal
condition, contact the nearest service center to have the HDD checked
by the service personnel.
I have installed an additional HDD on the DVR but it
does not recognize the HDD.
yy See the compatibilty list to check if the additional HDD is supported by
the DVR. For the compatibility list, contact the retailer where you
purchased the DVR.
I have connected an external storage device (external
SATA HDD) to the DVR but the DVR seems not to
recognize it.
yy See the compatibility list of external storage devices to check if the
connected device is supported by the DVR.
For the compatibility list, contact the retailer where you purchased the
DVR.
If I press the ESC key in full screen mode of the
WebViewer, the system does not switch to a normal
split mode.
I found it difficult to configure the network settings if
using the default search, backup and router settings.
yy Press the ALT+TAB keys to select ‘ACTIVE MOVIE’ and press the ESC
key again. The system will switch to a normal split mode.
yy For more information, refer to the user manual.
yy If you want to check the basics of the product for a quick start, refer to
the quick start guide (backup, search).
yy If you use the router for network connection, refer to the “Connecting
to the Internet using the router” section in this manual.
I forgot the password.
yy Contact the DVR administrator for help.
Backup data is just not played by the PC or DVR.
yy When you are backing up data, you have choices about the player
either: PC or DVR. Make your selection before proceeding.
yy If you are using the PC to play the data, the format of the backup file
should be either SEC.
yy If you are using the DVR for this purpose, formatting backup files should
be done by the DVR.
My player does not switch to Live mode while in
playback.
yy Press the Stop [@] button on the remote control, or click the [
icon on the launcher to switch to Live mode.
]
English _127
●● APPENDIX
A message of “Need to reset date/time.” Is displayed
on the screen.
appendix
Symptom
Countermeasures
Recording does not work.
yy If your player does not display a Live image at all, that indicates
recording does not work so first check if you see an image on the
screen.
yy Recording does not work if the recording settings are not properly
configured.
1) Manual Record: Press the [REC] button on the remote control to start
recording.
2) Scheduled Record: Specify a desired time in Menu – Record Recording Schedule. Recording will start at the specified time.
-- <Continuous> Record: Recording will proceed in any conditions
at the specified time.
-- <Event> Record: When an event occurs, recording will perform
only if the event is of alarm, motion detection, video loss and
Tampering Detection.
If there is no event found, recording will not perform.
-- <Continuous / Event> Record: If there is no event found,
Continuous recording will perform. Whereas, if an event occurs,
Event recording will perform.
The image quality of the recording data is not good.
yy Increase the resolution and quality level in Menu – Record – Quality /
Resolution.
1) Resolution: Select a bigger size when specifying the recording size.
(WD1>4CIF>2CIF>CIF)
The recording image in the CIF format shows a deteriorated quality
as it is enlarged from a small-sized image.
2) Record Quality: Specify a bigger level for the recording quality.
yy If you increase the resolution and the recording quality, the data size
increases accordingly. So the HDD will be filled faster. Overwriting will
overwrite the existing data so recording will proceed at a shorter
interval.
128_ appendix
Open Source Announcement
The software included in this product contains copyrighted software that is licensed under the GPL/LGPL. You may obtain the complete
Corresponding Source code from us for a period of three years after our last shipment of this product by sending email to [email protected]
If you want to obtain the complete Corresponding Source code in the physical medium such as CD-ROM, the cost of physically performing source
distribution might be charged.
• GPL Software : linux kernel, Sysvinit, dosfstools, wget, msmtp, busybox, cdrtools, dvd+rw-tools, iconv, smartctl, uboot, minicom, openssl, bash,
lm_sensors, parted, procps, util-linux 2.19.1, xfsprogs 3.1.7
• LGPL Software : glibc, vmstat, inetutils, calendarview.js, libiconv
• OpenSSL License : OpenSSL
• Boost Software License: Boost-1.43.0 (http://www.boost.org/)
• COMMON DEVELOPMENT AND DISTRIBUTION LICENSE: cdrtools 2.01.01
• FreeType Project LICENSE: freetype2
• RSA MD4 or MD5 Message-Digest Algorithm License : MD5 Message Digest Code
• MIT License : JQuery, Prototype JavaScript framework, FJCore
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom
to share and change it. By contrast, the GNU General Public License is
intended to guarantee your freedom to share and change free software
to make sure the software is free for all its users. This General Public
License applies to most of the Free Software Foundation’s software and
to any other program whose authors commit to using it. (Some other
Free Software Foundation software is covered by the GNU Lesser
General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price.
Our General Public Licenses are designed to make sure that you have
the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone
to deny you these rights or to ask you to surrender the rights. These
restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis
or for a fee, you must give the recipients all the rights that you have. You
must make sure that they, too, receive or can get the source code. And
you must show them these terms so they know their rights.
We protect your rights with two steps:
(1) copyright the software, and (2) offer you this license which gives you
legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software. If the software is modified by someone else and passed on,
we want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors’ reputations.
Finally, any free program is threatened constantly by software patents.
We wish to avoid the danger that redistributors of a free program will
individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must
be licensed for everyone’s free use or not licensed at all. The precise
terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING,
DISTRIBUTION AND MODIFICATION
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin S
0. This License applies to any program or other work which contains a
notice placed by the copyright holder saying it may be distributed under
the terms of this General Public License. The “Program”, below, refers
to any such program or work, and a “work based on the Program”
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language.
(Hereinafter, translation is included without limitation in the term
“modification”.) Each licensee is addressed as “you”.
Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of running
the Program is not restricted, and the output from the Program is
covered only if its contents constitute a work based on the Program
(independent of having been made by running the Program). Whether
that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program’s
source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices
that refer to this License and to the absence of any warranty; and give
any other recipients of the Program a copy of this License along with
the Program.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of
it, thus forming a work based on the Program, and copy and distribute
such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices
stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in
whole or in part contains or is derived from the Program or any
part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively
when run, you must cause it, when started running for such
interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a
notice that there is no warranty (or else, saying that you provide a
warranty) and that users may redistribute the program under these
conditions, and telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but does not normally
print such an announcement, your work based on the Program is
not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Program, and can be
reasonably considered independent and separate works in themselves,
then this License, and its terms, do not apply to those sections when
you distribute them as separate works. But when you distribute the
same sections as part of a whole which is a work based on the
Program, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire
whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your
rights to work written entirely by you; rather, the intent is to exercise the
right to control the distribution of derivative or collective works based on
the Program.
In addition, mere aggregation of another work not based on the
Program with the Program (or with a work based on the Program) on a
volume of a storage or distribution medium does not bring the other
work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable
source code, which must be distributed under the terms of
Sections 1 and 2 above on a medium customarily used for
software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to
give any third party, for a charge no more than your cost of
physically performing source distribution, a complete machinereadable copy of the corresponding source code, to be distributed
under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) A
ccompany it with the information you received as to the offer to
distribute corresponding source code. (This alternative is allowed
only for noncommercial distribution and only if you received the
program in object code or executable form with such an offer, in
accord with Subsection b above.)
The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control
compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is
normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on
which the executable runs, unless that component itself accompanies
the executable.
If distribution of executable or object code is made by offering access to
copy from a designated place, then offering equivalent access to copy
the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the
source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License. Any attempt otherwise
to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties
who have received copies, or rights, from you under this License will not
have their licenses terminated so long as such parties remain in full
compliance.
5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and all
its terms and conditions for copying, distributing or modifying the
Program or works based on it.
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the original
licensor to copy, distribute or modify the Program subject to these
terms and conditions. You may not impose any further restrictions on
the recipients’ exercise of the rights granted herein. You are not
responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot distribute
so as to satisfy simultaneously your obligations under this License and
any other pertinent obligations, then as a consequence you may not
distribute the Program at all. For example, if a patent license would not
permit royalty-free redistribution of the Program by all those who receive
copies directly or indirectly through you, then the only way you could
satisfy both it and this License would be to refrain entirely from
distribution of the Program.
If any portion of this section is held invalid or unenforceable under any
particular circumstance, the balance of the section is intended to apply
and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents
or other property right claims or to contest validity of any such claims;
this section has the sole purpose of protecting the integrity of the free
software distribution system, which is implemented by public license
practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to
decide if he or she is willing to distribute software through any other
system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be
a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain
countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Program under this License may add
an explicit geographical distribution limitation excluding those countries,
so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9. The Free Software Foundation may publish revised and/or new
versions of the General Public License from time to time. Such new
versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and “any
later version”, you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation. If the Program does not specify a version number
of this License, you may choose any version ever published by the Free
Software Foundation.
10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the author
to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we
sometimes make exceptions for this. Our decision will be guided by the
two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY
OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it free
software which everyone can redistribute and change under these
terms.
To do so, attach the following notices to the program. It is safest to
attach them to the start of each source file to most effectively convey
the exclusion of warranty; and each file should have at least the
“copyright” line and a pointer to where the full notice is found.
one line to give the program’s name and an idea of what it does.
Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the
Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
the GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software Foundation,
Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper
mail. If the program is interactive, make it output a short notice like this
when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
type ‘show w’. This is free software, and you are welcome to
redistribute it under certain conditions; type ‘show c’ for details.
The hypothetical commands ‘show w’ and ‘show c’ should show the
appropriate parts of the General Public License. Of course, the
commands you use may be called something other than ‘show w’ and
‘show c’; they could even be mouse-clicks or menu items--whatever
suits your program.
You should also get your employer (if you work as a programmer) or
your school, if any, to sign a “copyright disclaimer” for the program, if
necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
‘Gnomovision’ (which makes passes at compilers) written by James
Hacker.
signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice This
General Public License does not permit incorporating your program into
proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the
library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License.
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for software
and other kinds of works.
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom
to share and change all versions of a program--to make sure it remains
free software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to your
programs, too.
When we speak of free software, we are referring to freedom, not price.
Our General Public Licenses are designed to make sure that you have
the freedom to distribute copies of free software (and charge for them if
you wish), that you receive source code or can get it if you want it, that
you can change the software or use pieces of it in new free programs,
and that you know you can do these things.
To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if you
modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis
or for a fee, you must pass on to the recipients the same freedoms that
you received. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their
rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License giving
you legal permission to copy, distribute and/or modify it.
For the developers’ and authors’ protection, the GPL clearly explains
that there is no warranty for this free software. For both users’ and
authors’ sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the
manufacturer can do so. This is fundamentally incompatible with the
aim of protecting users’ freedom to change the software. The
systematic pattern of such abuse occurs in the area of products for
individuals to use, which is precisely where it is most unacceptable.
Therefore, we have designed this version of the GPL to prohibit the
practice for those products. If such problems arise substantially in other
domains, we stand ready to extend this provision to those domains in
future versions of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish
to avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and
modification follow.
TERMS AND CONDITIONS
0. Definitions.
“This License” refers to version 3 of the GNU General Public License.
“Copyright” also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.
“The Program” refers to any copyrightable work licensed under this
License. Each licensee is addressed as “you”. “Licensees” and
“recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a “modified version” of the
earlier work or a work “based on” the earlier work.
A “covered work” means either the unmodified Program or a work
based on the Program.
To “propagate” a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the public,
and in some countries other activities as well.
To “convey” a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays “Appropriate Legal Notices” to the
extent that it includes a convenient and prominently visible feature that
(1) displays an appropriate copyright notice, and (2) tells the user that
there is no warranty for the work (except to the extent that warranties
are provided), that licensees may convey the work under this License,
and how to view a copy of this License. If the interface presents a list of
user commands or options, such as a menu, a prominent item in the list
meets this criterion.
1. Source Code.
The “source code” for a work means the preferred form of the work for
making modifications to it. “Object code” means any non-source form
of a work.
A “Standard Interface” means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that is
widely used among developers working in that language.
The “System Libraries” of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A “Major
Component”, in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system (if
any) on which the executable work runs, or a compiler used to produce
the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work’s System
Libraries, or general-purpose tools or generally available free programs
which are used unmodified in performing those activities but which are
not part of the work. For example, Corresponding Source includes
interface definition files associated with source files for the work, and the
source code for shared libraries and dynamically linked subprograms
that the work is specifically designed to require, such as by intimate
data communication or control flow between those subprograms and
other parts of the work.
The Corresponding Source need not include anything that users can
regenerate automatically from other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same
work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains in
force. You may convey covered works to others for the sole purpose of
having them make modifications exclusively for you, or provide you with
facilities for running those works, provided that you comply with the
terms of this License in conveying all material for which you do not
control copyright. Those thus making or running the covered works for
you must do so exclusively on your behalf, under your direction and
control, on terms that prohibit them from making any copies of your
copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the
conditions stated below. Sublicensing is not allowed; section 10 makes
it unnecessary.
3. Protecting Users’ Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article 11 of
the WIPO copyright treaty adopted on 20 December 1996, or similar
laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such
circumvention is effected by exercising rights under this License with
respect to the covered work, and you disclaim any intention to limit
operation or modification of the work as a means of enforcing, against
the work’s users, your or third parties’ legal rights to forbid
circumvention of technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program’s source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any non-permissive
terms added in accord with section 7 apply to the code; keep intact all
notices of the absence of any warranty; and give all recipients a copy of
this License along with the Program.
You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.
b) T
he work must carry prominent notices stating that it is released
under this License and any conditions added under section 7. This
requirement modifies the requirement in section 4 to “keep intact all
notices”.
c) You must license the entire work, as a whole, under this License
to anyone who comes into possession of a copy. This License will
therefore apply, along with any applicable section 7 additional
terms, to the whole of the work, and all its parts, regardless of
how they are packaged. This License gives no permission to
license the work in any other way, but it does not invalidate such
permission if you have separately received it.
d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.
A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program, in
or on a volume of a storage or distribution medium, is called an
“aggregate” if the compilation and its resulting copyright are not used to
limit the access or legal rights of the compilation’s users beyond what
the individual works permit. Inclusion of a covered work in an aggregate
does not cause this License to apply to the other parts of the
aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of
sections 4 and 5, provided that you also convey the machine-readable
Corresponding Source under the terms of this License, in one of these
ways:
a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the
Corresponding Source fixed on a durable physical medium
customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by a
written offer, valid for at least three years and valid for as long as
you offer spare parts or customer support for that product model,
to give anyone who possesses the object code either (1) a copy of
the Corresponding Source for all the software in the product that
is covered by this License, on a durable physical medium
customarily used for software interchange, for a price no more
than your reasonable cost of physically performing this conveying
of source, or (2) access to copy the Corresponding Source from a
network server at no charge.
c) Convey individual copies of the object code with a copy of the
written offer to provide the Corresponding Source. This alternative
is allowed only occasionally and noncommercially, and only if you
received the object code with such an offer, in accord with
subsection 6b.
d) Convey the object code by offering access from a designated
place (gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at
no further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding
Source may be on a different server (operated by you or a third
party) that supports equivalent copying facilities, provided you
maintain clear directions next to the object code saying where to
find the Corresponding Source. Regardless of what server hosts
the Corresponding Source, you remain obligated to ensure that it
is available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided
you inform other peers where the object code and Corresponding
Source of the work are being offered to the general public at no
charge under subsection 6d.
A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.
A “User Product” is either (1) a “consumer product”, which means any
tangible personal property which is normally used for personal, family, or
household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer
product, doubtful cases shall be resolved in favor of coverage. For a
particular product received by a particular user, “normally used” refers to
a typical or common use of that class of product, regardless of the
status of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has
substantial commercial, industrial or non-consumer uses, unless such
uses represent the only significant mode of use of the product.
“Installation Information” for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product
from a modified version of its Corresponding Source. The information
must suffice to ensure that the continued functioning of the modified
object code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as part
of a transaction in which the right of possession and use of the User
Product is transferred to the recipient in perpetuity or for a fixed term
(regardless of how the transaction is characterized), the Corresponding
Source conveyed under this section must be accompanied by the
Installation Information. But this requirement does not apply if neither
you nor any third party retains the ability to install modified object code
on the User Product (for example, the work has been installed in ROM).
The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or
updates for a work that has been modified or installed by the recipient,
or for the User Product in which it has been modified or installed.
Access to a network may be denied when the modification itself
materially and adversely affects the operation of the network or violates
the rules and protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
“Additional permissions” are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall be
treated as though they were included in this License, to the extent that
they are valid under applicable law. If additional permissions apply only
to part of the Program, that part may be used separately under those
permissions, but the entire Program remains governed by this License
without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of it.
(Additional permissions may be written to require their own removal in
certain cases when you modify the work.) You may place additional
permissions on material, added by you to a covered work, for which
you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add
to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the terms of
sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or
author attributions in that material or in the Appropriate Legal
Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or
requiring that modified versions of such material be marked in
reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or
authors of the material; or
e) Declining to grant rights under trademark law for use of some
trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that material
by anyone who conveys the material (or modified versions of it)
with contractual assumptions of liability to the recipient, for any
liability that these contractual assumptions directly impose on
those licensors and authors.
All other non-permissive additional terms are considered “further
restrictions” within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is governed
by this License along with a term that is a further restriction, you may
remove that term. If a license document contains a further restriction but
permits relicensing or conveying under this License, you may add to a
covered work material governed by the terms of that license document,
provided that the further restriction does not survive such relicensing or
conveying.
If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the additional
terms that apply to those files, or a notice indicating where to find the
applicable terms.
Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions; the above
requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly
provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under this
License (including any patent licenses granted under the third paragraph
of section 11).
However, if you cease all violation of this License, then your license from
a particular copyright holder is reinstated (a) provisionally, unless and
until the copyright holder explicitly and finally terminates your license,
and (b) permanently, if the copyright holder fails to notify you of the
violation by some reasonable means prior to 60 days after the
cessation.
Moreover, your license from a particular copyright holder is reinstated
permanently if the copyright holder notifies you of the violation by some
reasonable means, this is the first time you have received notice of
violation of this License (for any work) from that copyright holder, and
you cure the violation prior to 30 days after your receipt of the notice.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a
copy of the Program. Ancillary propagation of a covered work occurring
solely as a consequence of using peer-to-peer transmission to receive a
copy likewise does not require acceptance. However, nothing other
than this License grants you permission to propagate or modify any
covered work. These actions infringe copyright if you do not accept this
License. Therefore, by modifying or propagating a covered work, you
indicate your acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible for
enforcing compliance by third parties with this License.
An “entity transaction” is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered work
results from an entity transaction, each party to that transaction who
receives a copy of the work also receives whatever licenses to the work
the party’s predecessor in interest had or could give under the previous
paragraph, plus a right to possession of the Corresponding Source of
the work from the predecessor in interest, if the predecessor has it or
can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights
granted or affirmed under this License. For example, you may not
impose a license fee, royalty, or other charge for exercise of rights
granted under this License, and you may not initiate litigation (including
a cross-claim or counterclaim in a lawsuit) alleging that any patent claim
is infringed by making, using, selling, offering for sale, or importing the
Program or any portion of it.
11. Patents.
A “contributor” is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor’s “contributor version”.
A contributor’s “essential patent claims” are all patent claims owned or
controlled by the contributor, whether already acquired or hereafter
acquired, that would be infringed by some manner, permitted by this
License, of making, using, or selling its contributor version, but do not
include claims that would be infringed only as a consequence of further
modification of the contributor version. For purposes of this definition,
“control” includes the right to grant patent sublicenses in a manner
consistent with the requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor’s essential patent claims, to make,
use, sell, offer for sale, import and otherwise run, modify and propagate
the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express
agreement or commitment, however denominated, not to enforce a
patent (such as an express permission to practice a patent or covenant
not to sue for patent infringement). To “grant” such a patent license to a
party means to make such an agreement or commitment not to enforce
a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and
the Corresponding Source of the work is not available for anyone to copy,
free of charge and under the terms of this License, through a publicly
available network server or other readily accessible means, then you must
either (1) cause the Corresponding Source to be so available, or (2)
arrange to deprive yourself of the benefit of the patent license for this
particular work, or (3) arrange, in a manner consistent with the
requirements of this License, to extend the patent license to downstream
recipients. “Knowingly relying” means you have actual knowledge that, but
for the patent license, your conveying the covered work in a country, or
your recipient’s use of the covered work in a country, would infringe one or
more identifiable patents in that country that you have reason to believe
are valid.
If, pursuant to or in connection with a single transaction or arrangement,
you convey, or propagate by procuring conveyance of, a covered work,
and grant a patent license to some of the parties receiving the covered
work authorizing them to use, propagate, modify or convey a specific
copy of the covered work, then the patent license you grant is
automatically extended to all recipients of the covered work and works
based on it.
A patent license is “discriminatory” if it does not include within the scope
of its coverage, prohibits the exercise of, or is conditioned on the
non-exercise of one or more of the rights that are specifically granted
under this License. You may not convey a covered work if you are a
party to an arrangement with a third party that is in the business of
distributing software, under which you make payment to the third party
based on the extent of your activity of conveying the work, and under
which the third party grants, to any of the parties who would receive the
covered work from you, a discriminatory patent license (a) in connection
with copies of the covered work conveyed by you (or copies made from
those copies), or (b) primarily for and in connection with specific
products or compilations that contain the covered work, unless you
entered into that arrangement, or that patent license was granted, prior
to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any
implied license or other defenses to infringement that may otherwise be
available to you under applicable patent law.
12. No Surrender of Others’ Freedom.
If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you
may not convey it at all. For example, if you agree to terms that obligate
you to collect a royalty for further conveying from those to whom you
convey the Program, the only way you could satisfy both those terms
and this License would be to refrain entirely from conveying the
Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work, but
the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions
of the GNU General Public License from time to time. Such new
versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program
specifies that a certain numbered version of the GNU General Public
License “or any later version” applies to it, you have the option of
following the terms and conditions either of that numbered version or of
any later version published by the Free Software Foundation. If the
Program does not specify a version number of the GNU General Public
License, you may choose any version ever published by the Free
Software Foundation.
If the Program specifies that a proxy can decide which future versions of
the GNU General Public License can be used, that proxy’s public
statement of acceptance of a version permanently authorizes you to
choose that version for the Program.
Later license versions may give you additional or different permissions.
However, no additional obligations are imposed on any author or
copyright holder as a result of your choosing to follow a later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY
OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above
cannot be given local legal effect according to their terms, reviewing
courts shall apply local law that most closely approximates an absolute
waiver of all civil liability in connection with the Program, unless a
warranty or assumption of liability accompanies a copy of the Program
in return for a fee.
END OF TERMS AND CONDITIONS
GNU LESSER GENERAL PUBLIC LICENSE
Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
[This is the first released version of the Lesser GPL.
It also counts as the successor of the GNU Library Public License,
version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom
to share and change it. By contrast, the GNU General Public Licenses
are intended to guarantee your freedom to share and change free
software to make sure the software is free for all its users.
This license, the Lesser General Public License, applies to some
specially designated software packages--typically libraries--of the Free
Software Foundation and other authors who decide to use it. You can
use it too, but we suggest you first think carefully about whether this
license or the ordinary General Public License is the better strategy to
use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
this service if you wish); that you receive source code or can get it if you
want it; that you can change the software and use pieces of it in new
free programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid
distributors to deny you these rights or to ask you to surrender these
rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a
fee, you must give the recipients all the rights that we gave you. You
must make sure that they, too, receive or can get the source code. If
you link other code with the library, you must provide complete object
files to the recipients, so that they can relink them with the library after
making changes to the library and recompiling it. And you must show
them these terms so they know their rights.
We protect your rights with a two-step method: (1) we copyright the
library, and (2) we offer you this license, which gives you legal
permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no
warranty for the free library. Also, if the library is modified by someone
else and passed on, the recipients should know that what they have is
not the original version, so that the original author’s reputation will not be
affected by problems that might be introduced by others.
Finally, software patents pose a constant threat to the existence of any
free program. We wish to make sure that a company cannot effectively
restrict the users of a free program by obtaining a restrictive license from
a patent holder. Therefore, we insist that any patent license obtained for
a version of the library must be consistent with the full freedom of use
specified in this license.
Most GNU software, including some libraries, is covered by the ordinary
GNU General Public License. This license, the GNU Lesser General
Public License, applies to certain designated libraries, and is quite
different from the ordinary General Public License. We use this license
for certain libraries in order to permit linking those libraries into non-free
programs.
When a program is linked with a library, whether statically or using a
shared library, the combination of the two is legally speaking a
combined work, a derivative of the original library. The ordinary General
Public License therefore permits such linking only if the entire
combination fits its criteria of freedom. The Lesser General Public
License permits more lax criteria for linking other code with the library.
We call this license the “Lesser” General Public License because it does
Less to protect the user’s freedom than the ordinary General Public
License. It also provides other free software developers Less of an
advantage over competing non-free programs. These disadvantages
are the reason we use the ordinary General Public License for many
libraries. However, the Lesser license provides advantages in certain
special circumstances.
For example, on rare occasions, there may be a special need to
encourage the widest possible use of a certain library, so that it
becomes a de-facto standard. To achieve this, non-free programs must
be allowed to use the library. A more frequent case is that a free library
does the same job as widely used non-free libraries. In this case, there
is little to gain by limiting the free library to free software only, so we use
the Lesser General Public License.
In other cases, permission to use a particular library in non-free
programs enables a greater number of people to use a large body of
free software. For example, permission to use the GNU C Library in
non-free programs enables many more people to use the whole GNU
operating system, as well as its variant, the GNU/Linux operating
system.
Although the Lesser General Public License is Less protective of the
users’ freedom, it does ensure that the user of a program that is linked
with the Library has the freedom and the wherewithal to run that
program using a modified version of the Library.
The precise terms and conditions for copying, distribution and
modification follow. Pay close attention to the difference between a
“work based on the library” and a “work that uses the library”. The
former contains code derived from the library, whereas the latter must
be combined with the library in order to run.
TERMS AND CONDITIONS FOR COPYING,
DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other
program which contains a notice placed by the copyright holder or
other authorized party saying it may be distributed under the terms of
this Lesser General Public License (also called “this License”). Each
licensee is addressed as “you”.
A “library” means a collection of software functions and/or data
prepared so as to be conveniently linked with application programs
(which use some of those functions and data) to form executables.
The “Library”, below, refers to any such software library or work which
has been distributed under these terms. A “work based on the Library”
means either the Library or any derivative work under copyright law: that
is to say, a work containing the Library or a portion of it, either verbatim
or with modifications and/or translated straightforwardly into another
language. (Hereinafter, translation is included without limitation in the
term “modification”.)
“Source code” for a work means the preferred form of the work for
making modifications to it. For a library, complete source code means
all the source code for all modules it contains, plus any associated
interface definition files, plus the scripts used to control compilation and
installation of the library.
Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of running a
program using the Library is not restricted, and output from such a
program is covered only if its contents constitute a work based on the
Library (independent of the use of the Library in a tool for writing it).
Whether that is true depends on what the Library does and what the
program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library’s
complete source code as you receive it, in any medium, provided that
you conspicuously and appropriately publish on each copy an
appropriate copyright notice and disclaimer of warranty; keep intact all
the notices that refer to this License and to the absence of any
warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of
it, thus forming a work based on the Library, and copy and distribute
such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices
stating that you changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge
to all third parties under the terms of this License.
d) If a facility in the modified Library refers to a function or a table of
data to be supplied by an application program that uses the
facility, other than as an argument passed when the facility is
invoked, then you must make a good faith effort to ensure that, in
the event an application does not supply such function or table,
the facility still operates, and performs whatever part of its purpose
remains meaningful.
(For example, a function in a library to compute square roots has a
purpose that is entirely well-defined independent of the application.
Therefore, Subsection 2d requires that any application-supplied function
or table used by this function must be optional: if the application does
not supply it, the square root function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Library, and can be
reasonably considered independent and separate works in themselves,
then this License, and its terms, do not apply to those sections when
you distribute them as separate works. But when you distribute the
same sections as part of a whole which is a work based on the Library,
the distribution of the whole must be on the terms of this License,
whose permissions for other licensees extend to the entire whole, and
thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your
rights to work written entirely by you; rather, the intent is to exercise the
right to control the distribution of derivative or collective works based on
the Library.
In addition, mere aggregation of another work not based on the Library
with the Library (or with a work based on the Library) on a volume of a
storage or distribution medium does not bring the other work under the
scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public
License instead of this License to a given copy of the Library. To do this,
you must alter all the notices that refer to this License, so that they refer
to the ordinary GNU General Public License, version 2, instead of to this
License. (If a newer version than version 2 of the ordinary GNU General
Public License has appeared, then you can specify that version instead
if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy,
so the ordinary GNU General Public License applies to all subsequent
copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the
Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of
it, under Section 2) in object code or executable form under the terms
of Sections 1 and 2 above provided that you accompany it with the
complete corresponding machine-readable source code, which must
be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange.
If distribution of object code is made by offering access to copy from a
designated place, then offering equivalent access to copy the source
code from the same place satisfies the requirement to distribute the
source code, even though third parties are not compelled to copy the
source along with the object code.
5. A program that contains no derivative of any portion of the Library,
but is designed to work with the Library by being compiled or linked
with it, is called a “work that uses the Library”. Such a work, in isolation,
is not a derivative work of the Library, and therefore falls outside the
scope of this License.
However, linking a “work that uses the Library” with the Library creates
an executable that is a derivative of the Library (because it contains
portions of the Library), rather than a “work that uses the library”. The
executable is therefore covered by this License. Section 6 states terms
for distribution of such executables.
When a “work that uses the Library” uses material from a header file
that is part of the Library, the object code for the work may be a
derivative work of the Library even though the source code is not.
Whether this is true is especially significant if the work can be linked
without the Library, or if the work is itself a library. The threshold for this
to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure
layouts and accessors, and small macros and small inline functions (ten
lines or less in length), then the use of the object file is unrestricted,
regardless of whether it is legally a derivative work. (Executables
containing this object code plus portions of the Library will still fall under
Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute
the object code for the work under the terms of Section 6. Any
executables containing that work also fall under Section 6, whether or
not they are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link
a “work that uses the Library” with the Library to produce a work
containing portions of the Library, and distribute that work under terms
of your choice, provided that the terms permit modification of the work
for the customer’s own use and reverse engineering for debugging such
modifications.
You must give prominent notice with each copy of the work that the
Library is used in it and that the Library and its use are covered by this
License. You must supply a copy of this License. If the work during
execution displays copyright notices, you must include the copyright
notice for the Library among them, as well as a reference directing the
user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machinereadable source code for the Library including whatever changes
were used in the work (which must be distributed under Sections
1 and 2 above); and, if the work is an executable linked with the
Library, with the complete machine readable “work that uses the
Library”, as object code and/or source code, so that the user can
modify the Library and then relink to produce a modified
executable containing the modified Library. (It is understood that
the user who changes the contents of definitions files in the Library
will not necessarily be able to recompile the application to use the
modified definitions.)
b) U
se a suitable shared library mechanism for linking with the Library.
A suitable mechanism is one that (1) uses at run time a copy of the
library already present on the user’s computer system, rather than
copying library functions into the executable, and (2) will operate
properly with a modified version of the library, if the user installs
one, as long as the modified version is interface-compatible with
the version that the work was made with.
c) Accompany the work with a written offer, valid for at least three
years, to give the same user the materials specified in Subsection
6a, above, for a charge no more than the cost of performing this
distribution.
d) If distribution of the work is made by offering access to copy from
a designated place, offer equivalent access to copy the above
specified materials from the same place.
e) Verify that the user has already received a copy of these materials
or that you have already sent this user a copy.
For an executable, the required form of the “work that uses the Library”
must include any data and utility programs needed for reproducing the
executable from it. However, as a special exception, the materials to be
distributed need not include anything that is normally distributed (in
either source or binary form) with the major components (compiler,
kernel, and so on) of the operating system on which the executable
runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions
of other proprietary libraries that do not normally accompany the
operating system. Such a contradiction means you cannot use both
them and the Library together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library
side-by-side in a single library together with other library facilities not
covered by this License, and distribute such a combined library,
provided that the separate distribution of the work based on the Library
and of the other library facilities is otherwise permitted, and provided
that you do these two things:
a) Accompany the combined library with a copy of the same work
based on the Library, uncombined with any other library facilities.
This must be distributed under the terms of the Sections above.
b) G
ive prominent notice with the combined library of the fact that part
of it is a work based on the Library, and explaining where to find the
accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the
Library except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense, link with, or distribute the Library
is void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under
this License will not have their licenses terminated so long as such
parties remain in full compliance.
9. You are not required to accept this License, since you have not signed
it. However, nothing else grants you permission to modify or distribute
the Library or its derivative works. These actions are prohibited by law if
you do not accept this License. Therefore, by modifying or distributing
the Library (or any work based on the Library), you indicate your
acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the
Library), the recipient automatically receives a license from the original
licensor to copy, distribute, link with or modify the Library subject to
these terms and conditions. You may not impose any further restrictions
on the recipients’ exercise of the rights granted herein. You are not
responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot distribute
so as to satisfy simultaneously your obligations under this License and
any other pertinent obligations, then as a consequence you may not
distribute the Library at all. For example, if a patent license would not
permit royalty free redistribution of the Library by all those who receive
copies directly or indirectly through you, then the only way you could
satisfy both it and this License would be to refrain entirely from
distribution of the Library.
If any portion of this section is held invalid or unenforceable under any
particular circumstance, the balance of the section is intended to apply, and
the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or
other property right claims or to contest validity of any such claims; this
section has the sole purpose of protecting the integrity of the free software
distribution system which is implemented by public license practices. Many
people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose
that choice.
This section is intended to make thoroughly clear what is believed to be
a consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain
countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Library under this License may add an
explicit geographical distribution limitation excluding those countries, so
that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
13. The Free Software Foundation may publish revised and/or new
versions of the Lesser General Public License from time to time. Such
new versions will be similar in spirit to the present version, but may differ
in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library
specifies a version number of this License which applies to it and “any
later version”, you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation. If the Library does not specify a license version
number, you may choose any version ever published by the Free
Software Foundation.
14. If you wish to incorporate parts of the Library into other free
programs whose distribution conditions are incompatible with these,
write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free
Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of
all derivatives of our free software and of promoting the sharing and
reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE
IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED
BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN
WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND,
EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU.
SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE
COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY
OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest
possible use to the public, we recommend making it free software that
everyone can redistribute and change. You can do so by permitting
redistribution under these terms (or, alternatively, under the terms of the
ordinary General Public License).
To apply these terms, attach the following notices to the library. It is
safest to attach them to the start of each source file to most effectively
convey the exclusion of warranty; and each file should have at least the
“copyright” line and a pointer to where the full notice is found. one line
to give the library’s name and an idea of what it does.
Copyright (C) year name of author
This library is free software; you can redistribute it and/or modify it under
the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or (at
your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 021101301 USA Also add information on how to contact you by electronic
and paper mail.
You should also get your employer (if you work as a programmer) or
your school, if any, to sign a “copyright disclaimer” for the library, if
necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the library
‘Frob’ (a library for tweaking knobs) written by James Random Hacker.
signature of Ty Coon, 1 April 1990 Ty Coon, President of Vice.
OpenSSL LICENSE
Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
must display the following acknowledgment: “This product includes
software developed by the OpenSSL Project for use in the OpenSSL
Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be
used to endorse or promote products derived from this software
without prior written permission. For written permission, please contact
[email protected]
5. Products derived from this software may not be called “OpenSSL”
nor may “OpenSSL” appear in their names without prior written
permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following
acknowledgment: “This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.
org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ‘‘AS IS’’
AND ANY EXPRESSED OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.This product includes cryptographic software written by Eric
Young ([email protected]). This product includes software written by
Tim Hudson ([email protected]).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young ([email protected]) All rights
reserved. This package is an SSL implementation written by Eric Young
([email protected]). The implementation was written so as to conform
with Netscapes SSL. This library is free for commercial and noncommercial use as long as the following conditions are aheared to. The
following conditions apply to all code found in this distribution, be it the
RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL
documentation included with this distribution is covered by the same
copyright terms except that the holder is Tim Hudson ([email protected]
com).
Copyright remains Eric Young’s, and as such any Copyright notices in
the code are not to be removed.
If this package is used in a product, Eric Young should be given
attribution as the author of the parts of the library used. This can be in
the form of a textual message at program startup or in documentation
(online or textual) provided with the package.Redistribution and use in
source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this
list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
must display the following acknowledgement: “This product includes
cryptographic software written by Eric Young ([email protected])” The
word ‘cryptographic’ can be left out if the rouines from the library being
used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an
acknowledgement: “This product includes software written by Tim
Hudson ([email protected])”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ‘‘AS IS’’ AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.The licence and distribution terms for any publically
available version or derivative of this code cannot be changed. i.e. this
code cannot simply be copied and put under another distribution
licence [including the GNU Public Licence.
Boost Software License
Boost Software License - Version 1.0 - August 17th, 2003 Permission is
hereby granted, free of charge, to any person or organization obtaining
a copy of the software and accompanying documentation covered by
this license (the “Software”) to use, reproduce, display, distribute,
execute, and transmit the Software, and to prepare derivative works of
the Software, and to permit third-parties to whom the Software is
furnished to do so, all subject to the following : The copyright notices in
the Software and this entire statement, including the above license
grant, this restriction and the following disclaimer, must be included in all
copies of the Software, in whole or in part, and all derivative works of
the Software, unless such copies or derivative works are solely in the
form of machine-executable object code generated by a source
language processor.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO
EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE
DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR
OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
COMMON DEVELOPMENT AND DISTRIBUTION
LICENSE Version 1.0
1. Definitions.
1.1. “Contributor” means each individual or entity that creates or
contributes to the creation of Modifications.
1.2. “Contributor Version” means the combination of the Original
Software, prior Modifications used by a Contributor (if any), and the
Modifications made by that particular Contributor.
1.3. “Covered Software” means (a) the Original Software, or (b)
Modifications, or (c) the combination of files containing Original Software
with files containing Modifications, in each case including portions
thereof.
1.4. “Executable” means the Covered Software in any form other than
Source Code.
1.5. “Initial Developer” means the individual or entity that first makes
Original Software available under this License.
1.6. “Larger Work” means a work which combines Covered Software or
portions thereof with code not governed by the terms of this License.
1.7. “License” means this document.
1.8. “Licensable” means having the right to grant, to the maximum
extent possible, whether at the time of the initial grant or subsequently
acquired, any and all of the rights conveyed herein.
1.9. “Modifications” means the Source Code and Executable form of
any of the following:
A. Any file that results from an addition to, deletion from or
modification of the contents of a file containing Original Software
or previous Modifications;
B. Any new file that contains any part of the Original Software or
previous Modifications; or
C. Any new file that is contributed or otherwise made available under
the terms of this License.
1.10. “Original Software” means the Source Code and Executable form
of computer software code that is originally released under this License.
1.11. “Patent Claims” means any patent claim(s), now owned or
hereafter acquired, including without limitation, method, process, and
apparatus claims, in any patent Licensable by grantor.
1.12. “Source Code” means (a) the common form of computer software
code in which modifications are made and (b) associated
documentation included in or with such code.
1.13. “You” (or “Your”) means an individual or a legal entity exercising
rights under, and complying with all of the terms of, this License. For
legal entities, “You” includes any entity which controls, is controlled by,
or is under common control with You. For purposes of this definition,
“control” means (a) the power, direct or indirect, to cause the direction
or management of such entity, whether by contract or otherwise, or (b)
ownership of more than fifty percent (50%) of the outstanding shares or
beneficial ownership of such entity.
2. License Grants.
2.1. The Initial Developer Grant.
Conditioned upon Your compliance with Section 3.1 below and subject
to third party intellectual property claims, the Initial Developer hereby
grants You a world-wide, royalty-free, non-exclusive license:
a) under intellectual property rights (other than patent or trademark)
Licensable by Initial Developer, to use, reproduce, modify, display,
perform, sublicense and distribute the Original Software (or
portions thereof), with or without Modifications, and/or as part of a
Larger Work; and
b) under Patent Claims infringed by the making, using or selling of
Original Software, to make, have made, use, practice, sell, and
offer for sale, and/or otherwise dispose of the Original Software (or
portions thereof).
c) The licenses granted in Sections 2.1(a) and (b) are effective on the
date Initial Developer first distributes or otherwise makes the
Original Software available to a third party under the terms of this
License.
d) Notwithstanding Section 2.1(b) above, no patent license is
granted: (1) for code that You delete from the Original Software, or
(2) for infringements caused by: (i) the modification of the Original
Software, or (ii) the combination of the Original Software with other
software or devices.
2.2. Contributor Grant.
Conditioned upon Your compliance with Section 3.1 below and subject
to third party intellectual property claims, each Contributor hereby
grants You a world-wide, royalty-free, non-exclusive license:
a) under intellectual property rights (other than patent or trademark)
Licensable by Contributor to use, reproduce, modify, display,
perform, sublicense and distribute the Modifications created by
such Contributor (or portions thereof), either on an unmodified
basis, with other Modifications, as Covered Software and/or as
part of a Larger Work; and
b) under Patent Claims infringed by the making, using, or selling of
Modifications made by that Contributor either alone and/or in
combination with its Contributor Version (or portions of such
combination), to make, use, sell, offer for sale, have made, and/or
otherwise dispose of: (1) Modifications made by that Contributor
(or portions thereof); and (2) the combination of Modifications
made by that Contributor with its Contributor Version (or portions
of such combination).
c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on
the date Contributor first distributes or otherwise makes the
Modifications available to a third party.
d) Notwithstanding Section 2.2(b) above, no patent license is
granted: (1) for any code that Contributor has deleted from the
Contributor Version; (2) for infringements caused by: (i) third party
modifications of Contributor Version, or (ii) the combination of
Modifications made by that Contributor with other software
(except as part of the Contributor Version) or other devices; or (3)
under Patent Claims infringed by Covered Software in the absence
of Modifications made by that Contributor.
3. Distribution Obligations.
3.1. Availability of Source Code.
Any Covered Software that You distribute or otherwise make available in
Executable form must also be made available in Source Code form and
that Source Code form must be distributed only under the terms of this
License. You must include a copy of this License with every copy of the
Source Code form of the Covered Software You distribute or otherwise
make available. You must inform recipients of any such Covered
Software in Executable form as to how they can obtain such Covered
Software in Source Code form in a reasonable manner on or through a
medium customarily used for software exchange.
version will be given a distinguishing version number. Except as
provided in Section 4.3, no one other than the license steward has the
right to modify this License.
4.2. Effect of New Versions.
You may always continue to use, distribute or otherwise make the
Covered Software available under the terms of the version of the
License under which You originally received the Covered Software. If the
Initial Developer includes a notice in the Original Software prohibiting it
from being distributed or otherwise made available under any
subsequent version of the License, You must distribute and make the
Covered Software available under the terms of the version of the
License under which You originally received the Covered Software.
Otherwise, You may also choose to use, distribute or otherwise make
the Covered Software available under the terms of any subsequent
version of the License published by the license steward.
4.3. Modified Versions.
When You are an Initial Developer and You want to create a new license
for Your Original Software, You may create and use a modified version
of this License if You: (a) rename the license and remove any references
to the name of the license steward (except to note that the license
differs from this License); and (b) otherwise make it clear that the license
contains terms which differ from this License.
5. DISCLAIMER OF WARRANTY.
3.3. Required Notices.
COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN
“AS IS” BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION,
WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF
DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR
NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU.
SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY
RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER
CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY
SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF
WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE.
NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED
HEREUNDER EXCEPT UNDER THIS DISCLAIMER.
3.4. Application of Additional Terms.
6.1. This License and the rights granted hereunder will terminate
automatically if You fail to comply with terms herein and fail to cure such
breach within 30 days of becoming aware of the breach. Provisions
which, by their nature, must remain in effect beyond the termination of
this License shall survive.
3.2. Modifications.
The Modifications that You create or to which You contribute are
governed by the terms of this License. You represent that You believe
Your Modifications are Your original creation(s) and/or You have
sufficient rights to grant the rights conveyed by this License.
You must include a notice in each of Your Modifications that identifies
You as the Contributor of the Modification. You may not remove or alter
any copyright, patent or trademark notices contained within the
Covered Software, or any notices of licensing or any descriptive text
giving attribution to any Contributor or the Initial Developer.
You may not offer or impose any terms on any Covered Software in
Source Code form that alters or restricts the applicable version of this
License or the recipients’ rights hereunder. You may choose to offer,
and to charge a fee for, warranty, support, indemnity or liability
obligations to one or more recipients of Covered Software. However,
you may do so only on Your own behalf, and not on behalf of the Initial
Developer or any Contributor. You must make it absolutely clear that any
such warranty, support, indemnity or liability obligation is offered by You
alone, and You hereby agree to indemnify the Initial Developer and every
Contributor for any liability incurred by the Initial Developer or such
Contributor as a result of warranty, support, indemnity or liability terms
You offer.
3.5. Distribution of Executable Versions.
You may distribute the Executable form of the Covered Software under
the terms of this License or under the terms of a license of Your choice,
which may contain terms different from this License, provided that You
are in compliance with the terms of this License and that the license for
the Executable form does not attempt to limit or alter the recipient’s
rights in the Source Code form from the rights set forth in this License. If
You distribute the Covered Software in Executable form under a different
license, You must make it absolutely clear that any terms which differ
from this License are offered by You alone, not by the Initial Developer or
Contributor. You hereby agree to indemnify the Initial Developer and
every Contributor for any liability incurred by the Initial Developer or such
Contributor as a result of any such terms You offer.
3.6. Larger Works.
You may create a Larger Work by combining Covered Software with
other code not governed by the terms of this License and distribute the
Larger Work as a single product. In such a case, You must make sure
the requirements of this License are fulfilled for the Covered Software.
4. Versions of the License.
4.1. New Versions.
Sun Microsystems, Inc. is the initial license steward and may publish
revised and/or new versions of this License from time to time. Each
6. TERMINATION.
6.2. If You assert a patent infringement claim (excluding declaratory
judgment actions) against Initial Developer or a Contributor (the Initial
Developer or Contributor against whom You assert such claim is
referred to as “Participant”) alleging that the Participant Software
(meaning the Contributor Version where the Participant is a Contributor
or the Original Software where the Participant is the Initial Developer)
directly or indirectly infringes any patent, then any and all rights granted
directly or indirectly to You by such Participant, the Initial Developer (if
the Initial Developer is not the Participant) and all Contributors under
Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from
Participant terminate prospectively and automatically at the expiration of
such 60 day notice period, unless if within such 60 day period You
withdraw Your claim with respect to the Participant Software against
such Participant either unilaterally or pursuant to a written agreement
with Participant.
6.3. In the event of termination under Sections 6.1 or 6.2 above, all end
user licenses that have been validly granted by You or any distributor
hereunder prior to termination (excluding licenses granted to You by any
distributor) shall survive termination.
7. LIMITATION OF LIABILITY.
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR
OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER
CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE,
OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY
PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR
CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR
MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES
OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED
OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
PERSONAL INJURY RESULTING FROM SUCH PARTY’S
NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH
LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL
DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY
TO YOU.
8. U.S. GOVERNMENT END USERS.
The Covered Software is a “commercial item,” as that term is defined in
48 C.F.R. 2.101 (Oct. 1995), consisting of “commercial computer
software” (as that term is defined at 48 C.F.R. 252.227-7014(a)(1)) and
“commercial computer software documentation” as such terms are
used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R.
12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all
U.S. Government End Users acquire Covered Software with only those
rights set forth herein. This U.S. Government Rights clause is in lieu of,
and supersedes, any other FAR, DFAR, or other clause or provision that
addresses Government rights in computer software under this License.
9. MISCELLANEOUS.
This License represents the complete agreement concerning subject
matter hereof. If any provision of this License is held to be
unenforceable, such provision shall be reformed only to the extent
necessary to make it enforceable. This License shall be governed by the
law of the jurisdiction specified in a notice contained within the Original
Software (except to the extent applicable law, if any, provides
otherwise), excluding such jurisdiction’s conflict-of-law provisions. Any
litigation relating to this License shall be subject to the jurisdiction of the
courts located in the jurisdiction and venue specified in a notice
contained within the Original Software, with the losing party responsible
for costs, including, without limitation, court costs and reasonable
attorneys’ fees and expenses. The application of the United Nations
Convention on Contracts for the International Sale of Goods is expressly
excluded. Any law or regulation which provides that the language of a
contract shall be construed against the drafter shall not apply to this
License. You agree that You alone are responsible for compliance with
the United States export administration regulations (and the export
control laws and regulation of any other countries) when You use,
distribute or otherwise make available any Covered Software.
10. RESPONSIBILITY FOR CLAIMS.
As between Initial Developer and the Contributors, each party is
responsible for claims and damages arising, directly or indirectly, out of
its utilization of rights under this License and You agree to work with
Initial Developer and Contributors to distribute such responsibility on an
equitable basis. Nothing herein is intended or shall be deemed to
constitute any admission of liability.
--------------------------------------------------------------------
NOTICE PURSUANT TO SECTION 9 OF THE COMMON
DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL)
For Covered Software in this distribution, this License shall be governed
by the laws of Germany (excluding conflict-of-law provisions).
Any litigation relating to this License shall be subject to the jurisdiction
and the courts of Berlin Germany, with venue lying in Berlin Germany.
The FreeType Project LICENSE
---------------------------2002-Apr-11
Copyright 1996-2002 by
David Turner, Robert Wilhelm, and Werner Lemberg
Introduction
============
The FreeType Project is distributed in several archive packages; some of
them may contain, in addition to the FreeType font engine, various tools
and contributions which rely on, or relate to, the FreeType Project.
This license applies to all files found in such packages, and which do
not fall under their own explicit license. The license affects thus the
FreeType font engine, the test programs, documentation and makefiles,
at the very least.
This license was inspired by the BSD, Artistic, and IJG (Independent
JPEG Group) licenses, which all encourage inclusion and use of free
software in commercial and freeware products alike. As a consequence,
its main points are that:
• We don’t promise that this software works. However, we will be
interested in any kind of bug reports. (`as is’ distribution)
• You can use this software for whatever you want, in parts or full form,
without having to pay us. (`royalty-free’ usage)
• You may not pretend that you wrote this software. If you use it, or
only parts of it, in a program, you must acknowledge somewhere in
your documentation that you have used the FreeType code. (`credits’)
We specifically permit and encourage the inclusion of this software, with
or without modifications, in commercial products. We disclaim all
warranties covering The FreeType Project and assume no liability related
to The FreeType Project.
Finally, many people asked us for a preferred form for a credit/disclaimer
to use in compliance with this license. We thus encourage you to use
the following text:
“Portions of this software are copyright © 1996-2002 The FreeType
Project (www.freetype.org). All rights reserved.”
Legal Terms
===========
1. Definitions
--------------
Throughout this license, the terms `package’, `FreeType Project’, and
`FreeType archive’ refer to the set of files originally distributed by the
authors (David Turner, Robert Wilhelm, and Werner Lemberg) as the
`FreeType Project’, be they named as alpha, beta or final release.
`You’ refers to the licensee, or person using the project, where `using’ is
a generic term including compiling the project’s source code as well as
linking it to form a `program’ or `executable’. This program is referred to
as `a program using the FreeType engine’.
This license applies to all files distributed in the original FreeType Project,
including all source code, binaries and documentation, unless otherwise
stated in the file in its original, unmodified form as distributed in the
original archive. If you are unsure whether or not a particular file is
covered by this license, you must contact us to verify this.
The FreeType Project is copyright (C) 1996-2000 by David Turner,
Robert Wilhelm, and Werner Lemberg. All rights reserved except as
specified below.
2. No Warranty
--------------
THE FREETYPE PROJECT IS PROVIDED `AS IS’ WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT
LIMITED TO, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE. IN NO EVENT WILL ANY OF THE AUTHORS
OR COPYRIGHT HOLDERS BE LIABLE FOR ANY DAMAGES CAUSED
BY THE USE OR THE INABILITY TO USE, OF THE FREETYPE PROJECT.
3. Redistribution
-----------------
This license grants a worldwide, royalty-free, perpetual and irrevocable
right and license to use, execute, perform, compile, display, copy, create
derivative works of, distribute and sublicense the FreeType Project (in
both source and object code forms) and derivative works thereof for any
purpose; and to authorize others to exercise some or all of the rights
granted herein, subject to the following conditions:
o Redistribution of source code must retain this license file (`FTL.TXT’)
unaltered; any additions, deletions or changes to the original files must
be clearly indicated in accompanying documentation. The copyright
notices of the unaltered, original files must be preserved in all copies
of source files.
o Redistribution in binary form must provide a disclaimer that states that
the software is based in part of the work of the FreeType Team, in the
distribution documentation. We also encourage you to put an URL to
the FreeType web page in your documentation, though this isn’t
mandatory.
These conditions apply to any software derived from or based on the
FreeType Project, not just the unmodified files. If you use our work, you
must acknowledge us. However, no fee need be paid to us.
4. Advertising
--------------
Neither the FreeType authors and contributors nor you shall use the
name of the other for commercial, advertising, or promotional purposes
without specific prior written permission.
We suggest, but do not require, that you use one or more of the
following phrases to refer to this software in your documentation or
advertising materials: `FreeType Project’, `FreeType Engine’, `FreeType
library’, or `FreeType Distribution’.
As you have not signed this license, you are not required to accept it.
However, as the FreeType Project is copyrighted material, only this
license, or another one contracted with the authors, grants you the right
to use, distribute, and modify it. Therefore, by using, distributing, or
modifying the FreeType Project, you indicate that you understand and
accept all the terms of this license.
5. Contacts
-----------
o [email protected]
Discusses general use and applications of FreeType, as well as future
and wanted additions to the library and distribution. If you are looking for
support, start in this list if you haven’t found anything to help you in the
documentation.
o [email protected]
Discusses bugs, as well as engine internals, design issues, specific
licenses, porting, etc.
Holds the current FreeType web page, which will allow you to download
our latest development version and read online documentation.
You can also contact us individually at: David Turner {[email protected]
freetype.org} Robert Wilhelm {[email protected]} Werner
Lemberg {[email protected]}
RSA MD4 or MD5 Message-Digest Algorithm
License
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights
reserved.
License to copy and use this software is granted provided that it is
identified as the “RSA Data Security, Inc. MD5 Message-Digest
Algorithm” in all material mentioning or referencing this software or this
function.
RSA Data Security, Inc. makes no representations concerning either the
merchantability of this software or the suitability of this software for any
particular purpose. It is provided “as is” without express or implied
warranty of any kind.
These notices must be retained in any copies of any part of this
documentation and/or software.
There are two mailing lists related to FreeType:
o http://www.freetype.org
License is also granted to make and use derivative works provided that
such works are identified as “derived from the RSA Data Security, Inc.
MD5 Message-Digest Algorithm” in all material mentioning or
referencing the derived work.
The MIT License
Copyright 2008 Jeffrey Powers for Fluxcapacity Open Source.
Copyright 2011, John Resig
Copyright 2005-2009 Sam Stephenson
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the
“Software”), to deal in the Software without restriction, including without
limitation the rights to use, copy, modify, merge, publish, distribute,
sublicense, and/or sell copies of the Software, and to permit persons to
whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.
Some software components of this product incorporate source code covered under the BSD license as follows.
Component Name
lighttpd 1.4.26
License
BSD 2.0
License URL
http://www.opensource.org/licenses/bsd-license.html
lighttpd is a secure, fast, compliant, and very flexible webserver that has been optimized for high-performance environments. It has a very low
memory footprint compared to other webservers and takes care of cpuload.
Its advanced feature-set (FastCGI, CGI, Auth, Output-Compression,
URL-Rewriting and many more) make lighttpd the perfect webserversoftware for every server that suffers load problems.
For more additional information, send email to [email protected]
Copyright (c) 2004, Kneschke, incremental
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met :
• Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
• Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
• Neither the name of the ‘incremental’ nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Component Name
librtp 1.20
License
BSD 2.0
License URL
http://www.opensource.org/licenses/bsd-license.html
For more additional information, send email to [email protected]
Copyright (c) 1998-2000 University College London
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, is permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
must display the following acknowledgement: This product includes
software developed by the Computer Science Department at
University College London
Component Name
net-snmp-5.4.1
License
BSD
License URL
http://www.net-snmp.org/about/license.html
Simple Network Management Protocol (SNMP) is an Internetstandard
protocol for managing devices on IP networks. It is used mostly in
network management systems to monitor the devices attached to the
network for conditions that need administrative attention. Net-SNMP is a
suite of applications used to implement SNMP v1, SNMP v2c and
SNMP v3 using both IPv4 and IPv6.
For more additional information, send email to [email protected]
Various copyrights apply to this package, listed in various separate parts
below. Please make sure that you read all the parts.
Part 1: CMU/UCD copyright notice: (BSD like)
Copyright 1989, 1991, 1992 by Carnegie Mellon University
Derivative Work - 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California
All Rights Reserved
Permission to use, copy, modify and distribute this software and its
documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appears in all copies and that
both that copyright notice and this permission notice appear in
supporting documentation, and that the name of CMU and The
Regents of the University of California not be used in advertising or
publicity pertaining to distribution of the software without specific written
permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA
DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE
UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
Part 2: Networks Associates Technology, Inc
copyright notice (BSD)
Copyright (c) 2001-2003, Networks Associates Technology, Inc
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
4. Neither the name of the University nor of the Department may be
used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
3. Neither the name of the Networks Associates Technology, Inc nor the
names of its contributors may be used to endorse or promote
products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 3: Cambridge Broadband Ltd. copyright notice
(BSD)
Portions of this code are copyright (c) 2001-2003, Cambridge
Broadband Ltd.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of Cambridge Broadband Ltd. may not be used to
endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS
IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Part 4: Sun Microsystems, Inc. copyright notice
(BSD)
Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa
Clara, California 95054, U.S.A.
All rights reserved.
Use is subject to license terms below. This distribution may include
materials developed by third parties. Sun, Sun Microsystems, the Sun
logo and Solaris are trademarks or registered trademarks of Sun
Microsystems, Inc. in the U.S. and other countries. Redistribution and
use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the Sun Microsystems, Inc. nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 5: Sparta, Inc copyright notice (BSD)
Copyright (c) 2003-2009, Sparta, Inc
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of Sparta, Inc nor the names of its contributors may
be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 6: Cisco/BUPTNIC copyright notice (BSD)
Copyright (c) 2004, Cisco, Inc and Information Network Center of
Beijing University of Posts and Telecommunications.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of Cisco, Inc, Beijing University of Posts and
Telecommunications, nor the names of their contributors may be
used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Part 7: Fabasoft R&D Software GmbH & Co KG
copyright notice (BSD)
Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003
[email protected]
Author: Bernhard Penz
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of Fabasoft R&D Software GmbH & Co KG or any of its
subsidiaries, brand or product names may not be used to endorse or
promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS
IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Part 8: Apple Inc. copyright notice (BSD)
Copyright (c) 2007 Apple Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of Apple Inc. (“Apple”) nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS
“AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR
ITSCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Part 9: ScienceLogic, LLC copyright notice (BSD)
Copyright (c) 2009, ScienceLogic, LLC
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
aremet:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of ScienceLogic, LLC nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
Component Name
miniupnpc 1.5
License
BSD 2.0
For more additional information, send email to [email protected]
Copyright (c) 2005-2009, Thomas BERNARD
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote
products derived from this software without specific prior written
permission.
Component Name
ppp 2.4.5
License
BSD 2.0
For more additional information, send email to [email protected]
Copyright (c) 2003 Paul Mackerras.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. The name(s) of the authors of this software must not be used to
endorse or promote products derived from this software without prior
written permission.
3. Redistributions of any form whatsoever must retain the following
acknowledgment: “This product includes software developed by Paul
Mackerras <[email protected]>”.
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 1995 Pedro Roque Marques.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
License URL
http://miniupnp.free.fr/
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
License URL
http://packages.debian.org/changelogs/pool/main/p/ppp/ppp_2.4.5-5.1/
ppp-udeb.copyright
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The names of the authors of this software must not be used to
endorse or promote products derived from this software without prior
written permission.
4. Redistributions of any form whatsoever must retain the following
acknowledgment: “This product includes software developed by
Pedro Roque Marques <[email protected]>”
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 1995 Eric Rosenquist.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name(s) of the authors of this software must not be used to
endorse or promote products derived from this software without prior
written permission.
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 2002 Google, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name(s) of the authors of this software must not be used to
endorse or promote products derived from this software without prior
written permission.
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 2001 by Sun Microsystems, Inc.
All rights reserved.
Non-exclusive rights to redistribute, modify, translate, and use this
software in source and binary forms, in whole or in part, is hereby
granted, provided that the above copyright notice is duplicated in any
source form, and that neither the name of the copyright holder nor the
author is used to endorse or promote products derived from this
software.
THIS SOFTWARE IS PROVIDED ``AS IS’’ AND WITHOUT ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE
IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Copyright (c) 1999 Tommi Komulainen.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name(s) of the authors of this software must not be used to
endorse or promote products derived from this software without prior
written permission.
4. Redistributions of any form whatsoever must retain the following
acknowledgment: “This product includes software developed by
Tommi Komulainen <[email protected]>”.
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 1984-2000 Carnegie Mellon University.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. R
edistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name “Carnegie Mellon University” must not be used to endorse
or promote products derived from this software without prior written
permission. For permission or any legal details, please contact Office
of Technology Transfer Carnegie Mellon University 5000 Forbes
Avenue Pittsburgh, PA 15213-3890 (412) 268-4387, fax: (412)
268-7395 [email protected]
4. Redistributions of any form whatsoever must retain the following
acknowledgment: “This product includes software developed by
Computing Services at Carnegie Mellon University (http://www.cmu.
edu/computing/).”
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA
OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
Samsung Techwin respeta el medio ambiente durante todo el proceso de fabricación de sus productos y realiza una serie de
procedimientos orientados a ofrecer productos ecológicos.
El símbolo Eco representa el compromiso de Samsung Techwin de fabricar productos que respeten el medio ambiente e indica a la vez
que este equipo cumple con la Directiva de la Unión Europea EU RoHS.
Correct Disposal of This Product (Waste Electrical & Electronic Equipment)
(Applicable in the European Union and other European countries with separate collection systems)
This marking on the product, accessories or literature indicates that the product and its electronic accessories (e.g. charger, headset,
USB cable) should not be disposed of with other household waste at the end of their working life. To prevent possible harm to the
environment or human health from uncontrolled waste disposal, please separate these items from other types of waste and recycle them
responsibly to promote the sustainable reuse of material resources.
Household users should contact either the retailer where they purchased this product, or their local government office, for details of
where and how they can take these items for environmentally safe recycling.
Business users should contact their supplier and check the terms and conditions of the purchase contract. This product and its electronic
accessories should not be mixed with other commercial wastes for disposal.
Correct disposal of batteries in this product
(Applicable in the European Union and other European countries with separate battery return systems.)
This marking on the battery, manual or packaging indicates that the batteries in this product should not be disposed of with other household waste at the end of their
working life. Where marked, the chemical symbols Hg, Cd or Pb indicate that the battery contains mercury, cadmium or lead above the reference levels in EC Directive
2006/66. If batteries are not properly disposed of, these substances can cause harm to human health or the environment.
To protect natural resources and to promote material reuse, please separate batteries from other types of waste and recycle them through your local, free battery
return system.
SALES NETWORK
SAMSUNG TECHWIN CO., LTD.
Samsungtechwin R&D Center, 701, Sampyeong-dong, Bundang-gu, Seongnam-si, Gyeonggi-do, Korea, 463-400
TEL : +82-70-7147-8740~60 FAX : +82-31-8018-3745
SAMSUNG TECHWIN AMERICA Inc.
100 Challenger Rd. Suite 700 Ridgefield Park, NJ 07660
Toll Free : +1-877-213-1222 Direct : +1-201-325-6920
Fax : +1-201-373-0124
www.samsungcctvusa.com
www.samsungtechwin.com
www.samsungsecurity.com
www.samsungipolis.com
SAMSUNG TECHWIN EUROPE LTD.
Samsung House, 1000 Hillswood Drive, Hillswood Business
Park Chertsey, Surrey, UNITED KINGDOM KT16 OPS
TEL : +44-1932-45-5300 FAX : +44-1932-45-5325
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement