Olivetti d-COLOR MF652 User Manual

(trademark licenses)
Hide thumbs Also See for d-COLOR MF652:
Table of Contents

Advertisement

d-COLOR MF652/d-COLOR MF752
Code: 571809

Advertisement

Table of Contents
loading

Summary of Contents for Olivetti d-COLOR MF652

  • Page 1 MF652/d-COLOR MF752 Code: 571809...
  • Page 2 Olivetti S.p.A. Gruppo Telecom Italia Via Jervis, 77 - 10015 Ivrea (ITALY) www.olivetti.com Copyright © 2012, Olivetti All rights reserved The mark affixed to the product certifies that the product satisfies the basic quality requirements. The manufacturer reserves the right to carry out modifications to the product described in this manual at any time and without any notice.
  • Page 3: Table Of Contents

    Table of contents Welcome User's Guides User's Guide Notations and symbols used in this manual................. 3-3 Procedural instruction........................3-3 Symbols used in this manual ......................3-3 Product and key names ........................3-4 Notations of application names ......................3-4 Original and paper indications....................... 3-5 Original and paper sizes ........................
  • Page 4 Trademarks and copyrights Trademark acknowledgements......................7-3 OpenSSL Statement .......................... 7-4 NetSNMP License..........................7-5 Kerberos............................. 7-7 WPA Supplicant ..........................7-9 wide-dhcpv6 ............................ 7-10 tcpdump............................7-10 libpcap ............................. 7-10 PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2............7-11 BEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0............. 7-11 CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 .................
  • Page 5 Welcome...
  • Page 7 Welcome Thank you for purchasing this machine. This User's Guide describes the functions, operating instructions, precautions for correct operation, and sim- ple troubleshooting guidelines of this machine. To obtain maximum performance from this product and to learn how to use it effectively, please read this User's Guide as necessary. d-Color MF752/652...
  • Page 8 d-Color MF752/652...
  • Page 9 User's Guides...
  • Page 11 User's Guides Manual title Overview [Quick Start Guide] This manual describes basic procedures to use this machine as well as setting procedures. It also introduces major functions to make use of this machine more convenient. This guide also contains notes and precautions that should be followed in order to use this machine.
  • Page 12 Manual title Overview [User's Guide: Accessibility] This manual describes how to adjust the machine in an easy-to- use manner to suit your requirements, for example, enlarging characters displayed on the touch panel or tuning the volume level of the warning sound. [User's Guide: Web Management This manual describes how to configure various initial settings Tool]...
  • Page 13: User's Guide

    User's Guide...
  • Page 15: Notations And Symbols Used In This Manual

    Notations and symbols used in this manual User's Guide Notations and symbols used in this manual Procedural instruction This check mark symbol shows a precondition of a procedure. This format number "1" represents the first step. This format number represents the order of serial steps. % This symbol indicates a supplementary explanation of a procedural instruction.
  • Page 16: Product And Key Names

    Notations and symbols used in this manual Product and key names Notations used in this Description manual An item enclosed by brackets [ ] indicates a key name on the Touch Panel or computer screen, or the name of a user's guide. Bold text This presents a key name, part name, product name, or option name on the Control Panel.
  • Page 17: Original And Paper Indications

    Original and paper indications Original and paper indications Original and paper sizes The following explains the indication for originals and paper described in this manual. When indicating the original or paper size, the Y side represents the width and the X side represents the length. Original and paper indications w indicates the paper size with the length (X) being longer than the width (Y).
  • Page 18 Original and paper indications d-Color MF752/652...
  • Page 19: Turning The Power On Or Off

    Turning the Power On or Off...
  • Page 21: Power Supply

    Turning the Power On or Off Power supply This machine provides two power switches: The Main Power Switch of the machine and the Power key on the Control Panel. Name Description Press this switch when turning on or off the main power of this ma- Main Power Switch chine or restarting this machine.
  • Page 22: Turn On The Main Power Switch

    Turn on the Main Power Switch Open the Lower Front Door, and set the Main Power Switch to n. Close the Lower Front Door. The Start key lights up orange, and a screen appears to show that this machine is in the process of start-up.
  • Page 23: Operating The Power Key (When Using This Machine In The Factory Default Status)

    Operating the Power key (When using this machine in the factory default sta- tus) Press the Power key to switch this machine to the Power Save mode. When the Power key is pressed, the status of this machine changes as shown below. The way status chang- es varies depending on how the Power key is pressed.
  • Page 24 Reference The Power key can be used as a power save key to switch to Power Save mode (Low Power or Sleep mode). For details, refer to [User's Guide: Control Panel]. d-Color MF752/652...
  • Page 25: Load The Original

    Load the original...
  • Page 27: Loading The Original Into The Adf

    Loading the original into the ADF Load the original Loading the original into the ADF Original available for ADF Item Specifications Original types 1-Sided Thin paper (35 g/m to 49 g/m Plain paper (50 g/m to 210 g/m 2-Sided Plain paper (50 g/m to 210 g/m Mixed original Plain paper (50 g/m...
  • Page 28: Loading The Original Into The Adf

    Loading the original into the ADF Loading the original into the ADF The ADF feeds original sheets one by one in order from the top, and automatically loads them. For a 2-sided original, the front and back sides are loaded simultaneously. The ADF is helpful when loading a large number of original.
  • Page 29: Placing The Original On The Original Glass

    Placing the original on the Original Glass Placing the original on the Original Glass Original available on the Original Glass Item Specifications Original types Sheets, books (two-page spread), cards, three-dimensional objects Original Size Max. 11 e 17 (A3) Original loading capacity Max.
  • Page 30 Placing the original on the Original Glass d-Color MF752/652...
  • Page 31: Loading Paper

    Loading Paper...
  • Page 33: Paper

    Paper Loading Paper Paper 6.1.1 Confirm the available paper types Paper Type Paper weight Paper capacity Thin paper 52 g/m to 59 g/m Bypass Tray: 150 sheets Tray 1: 500 sheets Tray 2: 500 sheets Tray 3: 1500 sheets Tray 4: 1000 sheets Large Capacity Unit LU-301: 3000 sheets Large Capacity Unit LU-204: 2500 sheets Plain paper...
  • Page 34 Paper Paper Type Paper weight Paper capacity Label sheets Bypass Tray: 50 sheets Index paper Bypass Tray: 70 sheets Banner paper 127 g/m to 210 g/m Bypass Tray: 10 sheets Paper on which you will not print on both sides (for example, when something is already printed on the front side).
  • Page 35: Precautions For Correct Operations

    Paper 6.1.2 Precautions for correct operations Inapplicable paper Do not load the following paper into the tray. Not observing these precautions may lead to reduced print qual- ity, a paper jam or damage to the machine. Transparencies that have already been fed through the machine (even if they are still blank) Paper that has been printed on with a heat-transfer printer or an inkjet printer Folded, curled, wrinkled, or torn paper Paper that has been left unwrapped for a long period of time...
  • Page 36: Loading Paper In Tray 1 Or Tray 2

    Loading paper in Tray 1 or Tray 2 Loading paper in Tray 1 or Tray 2 The procedure for loading paper is common between Tray 1 and Tray 2. The following explains how to load paper into Tray 1. Pull out Tray 1. NOTICE Be careful not to touch the Film.
  • Page 37: Loading Paper In Tray 3 Or Tray 4

    Loading paper in Tray 3 or Tray 4 Loading paper in Tray 3 or Tray 4 You can load a larger amount of paper into Tray 3 or Tray 4 than Tray 1 or Tray 2. It will be convenient to load the most frequently used paper into Tray 3 or Tray 4.
  • Page 38: Loading Paper Into The Bypass Tray

    Loading paper into the Bypass Tray Loading paper into the Bypass Tray How to load paper into the Bypass Tray When selecting a paper size other than for paper trays or printing on envelopes or transparencies, use the Bypass Tray. To use the Bypass Tray, load paper and specify the paper type.
  • Page 39: Loading Postcards

    Loading paper into the Bypass Tray Loading postcards Up to 50 postcards can be loaded into the tray. The following example explains how to load a postcard of 4 e 6 (A6 Card). With the print side facing down, load a postcard in the w di- rection as shown in the figure.
  • Page 40: Loading Transparencies

    Loading paper into the Bypass Tray Loading transparencies Transparency is a transparent film to project an enlarged image on the screen. Up to 20 transparencies can be loaded into the tray. With the print side facing down, load a transparency in the v direction as shown in the figure.
  • Page 41: Loading Envelopes

    Loading paper into the Bypass Tray Loading envelopes Up to 10 envelopes can be loaded into the tray. NOTICE Before loading, remove air from the envelope(s), and securely press along the flap fold line. Otherwise, it will result in an envelope wrinkle or paper jam. Face up the flap part, and load an envelope as shown in the figure.
  • Page 42: Loading Label Sheets

    Loading paper into the Bypass Tray Loading label sheets A label sheet consists of the printing surface, sticking layer, and pasteboard. Peel off the pasteboard, then you can stick the label to other objects. Up to 50 label sheets can be loaded into the tray. With the print side facing down, load a label sheet in the w di- rection as shown in the figure.
  • Page 43: Loading Index Papers

    Loading paper into the Bypass Tray Loading index papers Up to 70 index papers can be loaded into the tray. With the print side facing down, align the tab side to the oppo- site side of this machine. Slide the Lateral Guide to fit the size of the loaded paper. Change the paper type setting.
  • Page 44: Loading Banner Papers

    Loading paper into the Bypass Tray Loading banner papers This machine prints data stored in a computer on banner paper that is up to 1200 mm in length. Up to 10 banner sheets can be loaded into the Bypass Tray. Install the Mount Kit MK-715 into the Bypass Tray.
  • Page 45: Loading Paper To The Large Capacity Unit

    Loading paper to the Large Capacity Unit Loading paper to the Large Capacity Unit The procedure for loading paper is common between the Large Capacity Unit LU-301 and Large Capacity Unit LU-204. The following procedure describes how to load paper into Large Capacity Unit LU-301. The Large Capacity Unit is an optional unit.
  • Page 46 Loading paper to the Large Capacity Unit 6-16 d-Color MF752/652...
  • Page 47: Trademarks And Copyrights

    Trademarks and copyrights...
  • Page 49: Trademark Acknowledgements

    Trademarks and copyrights Trademark acknowledgements Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. Mozilla and Firefox are trademarks of the Mozilla Foundation. Novell and Novell NetWare are registered trademarks of Novell, Inc. in the United States and other countries. Microsoft, Windows, Windows Vista and Windows 7 are either registered trademarks or trademarks of Mi- crosoft Corporation in the United States and/or other countries.
  • Page 50 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 51: Netsnmp License

    ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed.
  • Page 52 STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 4: Sun Microsystems, Inc. copyright notice (BSD) Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved.
  • Page 53: Kerberos

    OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Kerberos Copyright ©...
  • Page 54 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  • Page 55: Wpa Supplicant

    THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION FROM THE UNIVERSITY OF MICHI- GAN AS TO ITS FITNESS FOR ANY PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF MICH- IGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  • Page 56: Wide-Dhcpv6

    wide-dhcpv6 $KAME: COPYRIGHT, v 1.2 2004/07/29 19:02:18 jinmei Exp $ Copyright © 1998-2004 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 57: Python Software Foundation License Version 2

    PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 This LICENSE AGREEMENT is between the Python Software Foundation ("PSF"), and the Individual or Organization ("Licensee") accessing and otherwise using this software ("Python") in source or binary form and its associated documentation. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonex- clusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and otherwise use Python alone or in any derivative version, pro- vided, however, that PSF's License Agreement and PSF's notice of copyright, i.e., "Copyright ©...
  • Page 58: Cnri License Agreement For Python 1.6.1

    CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 This LICENSE AGREEMENT is between the Corporation for National Research Initiatives, having an of- fice at 1895 Preston White Drive, Reston, VA 20191 ("CNRI"), and the Individual or Organization ("Li- censee") accessing and otherwise using Python 1.6.1 software in source or binary form and its associated documentation.
  • Page 59: Licenses And Acknowledgements For Incorporated Software

    Licenses and Acknowledgements for Incorporated Software This section is an incomplete, but growing list of licenses and acknowledgements for third-party software in- corporated in the Python distribution. Mersenne Twister ------- The _random module includes code based on a download from http://www.math.keio.ac.jp/ matumo- to/MT2002/emt19937ar.html.
  • Page 60 ITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN GAI_ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. MD5 message digest algorithm ------- The source code for the md5 module contains the following notice: Copyright ©...
  • Page 61: Linux Trademarks

    The uu module contains the following notice: Copyright 1994 by Lance Ellinghouse Cathedral City, California Republic, United States of America. All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Lance Ellinghouse not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
  • Page 62 GNU GENERAL PUBLIC LICENSETERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODI- FICATION 0. This License Agreement applies to any program or other work which contains a notice placed by the cop- yright holder saying it may be distributed under the terms of this General Public License. The "Program", be- low, refers to any such program or work, and a "work based on the Program"...
  • Page 63 7. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to ad- dress new problems or concerns. Each version is given a distinguishing version number.
  • Page 64 Yoyodyne, Inc., hereby disclaims all copyright interest in the program 'Gnomovision' (a program to direct compilers to make passes at assemblers) written by James Hacker. <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice That's all there is to it! GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright ©...
  • Page 65 You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the...
  • Page 66 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
  • Page 67 If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
  • Page 68 Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software.
  • Page 69 files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
  • Page 70 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for soft-...
  • Page 71 "Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
  • Page 72 Each time you convey a covered work, the recipient automatically receives a license from the original licen- sors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License. An "entity transaction"...
  • Page 73 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work.
  • Page 74 You should have received a copy of the GNU General Public License along with this program. If not, see <ht- tp://www.gnu.org/licenses/>. Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode: <program>...
  • Page 75 Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public License, applies to certain designated libraries. This license is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary license.
  • Page 76 d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
  • Page 77 displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library in- cluding whatever changes were used in the work (which must be distributed under Sections 1 and 2 above);...
  • Page 78 application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
  • Page 79 You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library 'Frob' (a library for tweaking knobs) writ- ten by James Random Hacker.
  • Page 80 Public License for many libraries. However, the Lesser license provides advantages in certain special circum- stances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a cer- tain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library.
  • Page 81 used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
  • Page 82 produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was...
  • Page 83 application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
  • Page 84 You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library 'Frob' (a library for tweaking knobs) writ- ten by James Random Hacker.
  • Page 85 a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Li- brary and its use are covered by this License. b) Accompany the Combined Work with a copy of the GNU GPL and this license document. c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.
  • Page 86 The following is the license that applies to this copy of the Berkeley DB software. For a license to use the Berkeley DB software under conditions other than those described here, or to purchase support for this soft- ware, please contact Oracle at berkeleydb-info_us@oracle.com. ------- Copyright ©...
  • Page 87 THIS SOFTWARE IS PROVIDED BY HARVARD AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT- ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL HARVARD OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 88 All rights reserved. "As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived versions of this software must be clearly marked as such, and if the derived work is incompatible with the protocol description in the RFC file, it must be called by a name other than "ssh"...
  • Page 89 All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the fol- lowing disclaimer.
  • Page 90 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT- WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission.
  • Page 91 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPY- RIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCI- DENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PRO- GRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH...
  • Page 92 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT- ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE RE- GENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 93 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the fol- lowing disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS"...
  • Page 94 Chad Mynhier Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES WITH RE- GARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT- NESS.
  • Page 95 * Redistributions of source code must retain the above copyright notice, this list of conditions and the follow- ing disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the fol- lowing disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the University of Cambridge nor the name of Google Inc.
  • Page 96 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software with- out specific prior written permission.
  • Page 97 Copyright © 1990, 1993 The Regents of the University of California. All rights reserved. This code is derived from software contributed to Berkeley by Van Jacobson. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 98 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the fol- lowing disclaimer. 2.
  • Page 99 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI- DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 100 groups Copyright © 1991 - 1993, Julianne Frances Haugh Copyright © 1996 - 2000, Copyright © 2001 - 2006, Copyright © 2007 - 2008, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 101 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the fol- lowing disclaimer. 2.
  • Page 102 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI- DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 103 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the copyright holders or contributors may not be used to endorse or promote products de- rived from this software without specific prior written permission.
  • Page 104 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSI- NESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON- TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  • Page 105 Copyright © 2007 - 2008, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the fol- lowing disclaimer.
  • Page 106 3. The name of the copyright holders or contributors may not be used to endorse or promote products de- rived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 107 Copyright © 1990 - 1993, Julianne Frances Haugh Copyright © 1996 - 2000, Copyright © 2001 - 2006, Copyright © 2007 - 2008, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 108 3. The name of the copyright holders or contributors may not be used to endorse or promote products de- rived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 109 Copyright © 1991 - 1994, Julianne Frances Haugh Copyright © 1996 - 2000, Copyright © 2001 - 2006, Copyright © 2007 - 2008, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 110 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the fol- lowing disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3.
  • Page 111 The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, IN- CLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICU- LAR PURPOSE AND NONINFRINGEMENT.
  • Page 112 WARNING: Retrieving the OpenVision Kerberos Administration system source code, as described below, in- dicates your acceptance of the following terms. If you do not agree to the following terms, do not retrieve the OpenVision Kerberos administration system. You may freely use and distribute the Source Code and Object Code compiled from it, with or without mod- ification, but this Source Code is provided to you "AS IS"...
  • Page 113 Portions contributed by Red Hat, including the pre-authentication plug-ins framework, contain the following copyright: Copyright © 2006 Red Hat, Inc. Portions copyright © 2006 Massachusetts Institute of Technology All Rights Reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the follow- ing disclaimer.
  • Page 114 lib/gssapi/mechglue/g_seal.c lib/gssapi/mechglue/g_sign.c lib/gssapi/mechglue/g_store_cred.c lib/gssapi/mechglue/g_unseal.c lib/gssapi/mechglue/g_userok.c lib/gssapi/mechglue/g_utils.c lib/gssapi/mechglue/g_verify.c lib/gssapi/mechglue/gssd_pname_to_uid.c lib/gssapi/mechglue/mglueP.h lib/gssapi/mechglue/oid_ops.c lib/gssapi/spnego/gssapiP_spnego.h lib/gssapi/spnego/spnego_mech.c and the initial implementation of incremental propagation, including the following new or changed files: include/iprop_hdr.h kadmin/server/ipropd_svc.c lib/kdb/iprop.x lib/kdb/kdb_convert.c lib/kdb/kdb_log.c lib/kdb/kdb_log.h lib/krb5/error_tables/kdb5_err.et slave/kpropd_rpc.c slave/kproplog.c and marked portions of the following files: lib/krb5/os/hst_realm.c are subject to the following license: Copyright ©...
  • Page 115 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT- ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 116 This file is free software; as a special exception the author gives unlimited permission to copy and/or distrib- ute it, with or without modifications, as long as this notice is preserved. This file is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY, to the extent permit- ted by law;...
  • Page 117 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT- WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission.
  • Page 118 In legalese: The authors make NO WARRANTY or representation, either express or implied, with respect to this software, its quality, accuracy, merchantability, or fitness for a particular purpose. This software is provided "AS IS", and you, its user, assume the entire risk as to its quality and accuracy. This software is copyright ©...
  • Page 119 Except as contained in this notice, the name of Daniel Veillard shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from him. ncurses ------------------------------------------------------------------------------- Copyright © 1998-2004,2006 Free Software Foundation, Inc. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, distribute with modifications, sublicense, and/or...
  • Page 120 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  • Page 121: Copyright

    User's Guide may not be reproduced in part or in full without permission. OLIVETTI S.p.A. will not be held liable for any incidents caused by using this printing system or User's Guide. Information included in User's Guide is subject to change without notice.
  • Page 122: Software License Agreement

    SOFTWARE LICENSE AGREEMENT This package contains the following materials provided by KONICA MINOLTA BUSINESS TECHNOLOGIES, INC. (KMBT): software included as part of the printing system ("Printing Software"), the digitally-encoded ma- chine-readable outline data encoded in the special format and in the encrypted form ("Font Programs"), other software which runs on a computer system for use in conjunction with the Printing Software ("Host Soft- ware"), and related explanatory written materials ("Documentation").
  • Page 123: About Adobe Color Profile

    About Adobe Color Profile ADOBE SYSTEMS INCORPORATED COLOR PROFILE LICENSE AGREEMENT NOTICE TO USER: PLEASE READ THIS CONTRACT CAREFULLY. BY USING ALL OR ANY PORTION OF THE SOFTWARE YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS SOFTWARE YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT.
  • Page 124: Icc Profile For Toyo Ink Standard Color On Coated Paper (Toyo Offset Coated 3.0)

    TERM This Agreement is effective until terminated. Adobe has the right to terminate this Agreement im- mediately if you fail to comply with any term hereof. Upon any such termination, you must return to Ado- be all full and partial copies of the Software in your possession or control. GOVERNMENT REGULATIONS If any part of the Software is identified as an export controlled item un- der the United States Export Administration Act or any other export law, restriction or regulation (the "Export Laws"), you represent and warrant that you are not a citizen, or otherwise located within, an...
  • Page 125: Dic Standard Color Profile License Agreement

    DIC STANDARD COLOR PROFILE LICENSE AGREEMENT IMPORTANT: PLEASE READ THIS STANDARD COLOR PROFILE LICENSE AGREEMENT ("LICENSE AGREEMENT") CAREFULLY BEFORE USING THE DIC STANDARD COLOR PROFILE, INCLUDING THE DIC STANDARD COLOR SFC1.0.1, DIC STANDARD COLOR SFC1.0.2, DIC STANDARD COLOR SFM1.0.2, DIC STANDARD COLOR SFU1.0.2, PROVIDED BY DIC HEREWITH, AND ANY CORRESPONDIMG ONLINE OR ELECTRONC DOCUMENTATION AND ALL UPDATES OR UPGRADES OF THE ABOVE THAT ARE PROVID- ED TO YOU (COLLECTIVELY, THE "PROFILE").
  • Page 126: I-Option Lk-105 V3 (Searchable Pdfs) End User License Agreement

    LIMITATION OF LIABILITY DIC SHALL NOT BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, COVER OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR THE INABILITY TO USE EQUIPMENT OR ACCESS DATA, LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION OR THE LIKE), ARISING OUT OF THE USE OF, OR INABILITY TO USE, THE PROFILE AND BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY...
  • Page 127 DIRECTIVE 2002/96/EC ON THE TREATMENT, COLLECTION, RECYCLING AND DISPOSAL OF ELECTRIC AND ELECTRONIC DEVICES AND THEIR COMPONENTS INFORMATION 1. FOR COUNTRIES IN THE EUROPEAN UNION (EU) The disposal of electric and electronic devices as solid urban waste is strictly prohibited: it must be collected separately. The dumping of these devices at unequipped and unauthorized places may have hazardous effects on health and the environment.

This manual is also suitable for:

D-color mf752

Table of Contents