Home > Ricoh > All in One Printer > Ricoh Mp C4500 Instruction Manual

Ricoh Mp C4500 Instruction Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Ricoh Mp C4500 Instruction Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 127 Ricoh manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Information about Installed Software
    301
    9
    Samba(Ver 3.0.4)
    For SMB transmission, this machine uses Samba ver 3.0.4 (hereinafter referred to
    as Samba 3.0.4).
    Copyright © Andrew Tridgell 1994-1998
    This program is free software; you can redistribute it and/or modify it under the
    terms of the GNU General Public License as published by the Free Software
    Foundation; either version 2 of the License, or (at your option) any later version.
    This program is distributed in the hope that it will be useful, but WITHOUT
    ANY WARRANTY; without even the implied warranty of MERCHANTABILI-
    TY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
    License along with this program; if not, write to the Free Software Foundation,
    Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
    Note
    ❒The source code for SMB transmission by this machine can be downloaded
    from the following website:
    http://support-download.com/services/scbs
    RSA BSAFE®
     This product includes RSA BSAFE® cryptographic or security protocol soft-
    ware from RSA Security Inc.
     RSA and BSAFE are registered trademarks of RSA Security Inc. in the United
    States and/or other countries.
     RSA Security Inc. All rights reserved. 
    						
    							Appendix
    302
    9
    Open SSL
    Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved.
    Redistribution and use in source and binary forms, with or without modifica-
    tion, are permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list
    of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
    this list of conditions and the following disclaimer in the documentation and/or
    other materials provided with the distribution.
    3. All advertising materials mentioning features or use of this software must display
    the following acknowledgment: This product includes software developed by the
    OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)
    4. The names OpenSSL Toolkit and OpenSSL Project must not be used to en-
    dorse or promote products derived from this software without prior written per-
    mission. For written permission, please contact [email protected].
    5. Products derived from this software may not be called OpenSSL nor may
    OpenSSL appear in their names without prior written permission of the
    OpenSSL Project.
    6. Redistributions of any form whatsoever must retain the following acknowl-
    edgment: This product includes software developed by the OpenSSL Project for
    use in the OpenSSL Toolkit (http://www.openssl.org/)
    THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS AND
    ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIM-
    ITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
    NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
    SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
    ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON-
    SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
    MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
    ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILI-
    TY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
    ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
    THE POSSIBILITY OF SUCH DAMAGE. 
    						
    							Information about Installed Software
    303
    9
    This product includes cryptographic software written by Eric Young
    ([email protected]). This product includes software written by Tim Hudson
    ([email protected]).
    Original SSLeay License
    Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved.
    This package is an SSL implementation written by Eric Young (eay@crypt-
    soft.com).
    The implementation was written so as to conform with Netscapes SSL.
    This library is free for commercial and non-commercial use as long as the follow-
    ing conditions are aheared to. The following conditions apply to all code found
    in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL
    code. The SSL documentation included with this distribution is covered by the
    same copyright terms except that the holder is Tim Hudson ([email protected]).
    Note that any information and cryptographic algorithms used in this software
    are publicly available on the Internet and at any major bookstore, scientific li-
    brary, and patent office worldwide. More information can be found e.g. at ht-
    tp://www.cs.hut.fi/crypto.
    The legal status of this program is some combination of all these permissions
    and restrictions. Use only at your own responsibility. You will be responsible for
    any legal consequences yourself; I am not making any claims whether possess-
    ing or using this is legal or not in your country, and I am not taking any respon-
    sibility on your behalf.
    NO WARRANTY
    BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
    WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLI-
    CABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COP-
    YRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM
    AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IM-
    PLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
    OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
    THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
    PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
    YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
    CORRECTION. 
    						
    							Appendix
    304
    9
    IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO
    IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY
    WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT-
    TED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GEN-
    ERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
    OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT
    NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCU-
    RATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
    OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
    IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSI-
    BILITY OF SUCH DAMAGES.
    2)
    The 32-bit CRC compensation attack detector in deattack.c was contributed by
    CORE SDI S.A. under a BSD-style license.
    Cryptographic attack detector for ssh - source code
    Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
    All rights reserved. Redistribution and use in source and binary forms, with or
    without modification, are permitted provided that this copyright notice is re-
    tained.
    THIS SOFTWARE IS PROVIDED ``AS IS AND ANY EXPRESS OR IMPLIED
    WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
    LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLA-
    RY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MIS-
    USE OF THIS SOFTWARE.
    Ariel Futoransky 
    
    3)
    One component of the ssh source code is under a 3-clause BSD license, held by
    the University of California, since we pulled these parts from original Berkeley
    code.
    Copyright (c) 1983, 1990, 1992, 1993, 1995
    The Regents of the University of California. All rights reserved.
    Redistribution and use in source and binary forms, with or without modifica-
    tion, are permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list
    of conditions and the following disclaimer. 
    						
    							Information about Installed Software
    305
    9
    2. Redistributions in binary form must reproduce the above copyright notice,
    this list of conditions and the following disclaimer in the documentation and/or
    other materials provided with the distribution.
    3. Neither the name of the University nor the names of its contributors may be
    used to endorse or promote products derived from this software without specif-
    ic prior written permission.
    THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS
    ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
    NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
    AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
    EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
    DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
    QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
    MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
    ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILI-
    TY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
    ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
    THE POSSIBILITY OF SUCH DAMAGE.
    4)
    Remaining components of the software are provided under a standard 2-term
    BSD licence with the following names as copyright holders:
    Markus Friedl
    Theo de Raadt
    Niels Provos
    Dug Song
    Kevin Steves
    Daniel Kouril
    Wesley Griffin
    Per Allansson
    Jason Downs
    Solar Designer
    Todd C. Miller
    Redistribution and use in source and binary forms, with or without modifica-
    tion, are permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list
    of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
    this list of conditions and the following disclaimer in the documentation and/or
    other materials provided with the distribution. 
    						
    							Appendix
    306
    9
    THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS AND ANY EX-
    PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
    A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
    AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPE-
    CIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
    NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
    LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOW-
    EVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
    TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
    OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
    WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    5)
    Portable OpenSSH contains the following additional licenses:
     c) Compatibility code (openbsd-compat)
    Apart from the previously mentioned licenses, various pieces of code in the
    openbsd-compat/ subdirectory are licensed as follows:
    Some code is licensed under a 3-term BSD license, to the following copyright
    holders:
    Todd C. Miller
    Theo de Raadt
    Damien Miller
    Eric P. Allman
    The Regents of the University of California
    Redistribution and use in source and binary forms, with or without modifica-
    tion, are permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list
    of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
    this list of conditions and the following disclaimer in the documentation and/or
    other materials provided with the distribution.
    3. Neither the name of the University nor the names of its contributors may be
    used to endorse or promote products derived from this software without specif-
    ic prior written permission. 
    						
    							Information about Installed Software
    307
    9
    THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS
    ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
    NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
    AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
    EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
    DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
    QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
    MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
    ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILI-
    TY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
    ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
    THE POSSIBILITY OF SUCH DAMAGE.
    Open SSH
    The licences which components of this software fall under are as follows. First,
    we will summarize and say that all components are under a BSD licence, or a li-
    cence more free than that.
    OpenSSH contains no GPL code.
    1)
    Copyright (c) 1995 Tatu Ylonen , Espoo, Finland All rights re-
    served
    As far as I am concerned, the code I have written for this software can be used
    freely for any purpose. Any derived versions of this software must be clearly
    marked as such, and if the derived work is incompatible with the protocol de-
    scription in the RFC file, it must be called by a name other than ssh or Secure
    Shell.
    [Tatu continues]
    However, I am not implying to give any licenses to any patents or copyrights
    held by third parties, and the software includes parts that are not under my di-
    rect control. As far as I know, all included source code is used in accordance with
    the relevant license agreements and can be used freely for any purpose (the
    GNU license being the most restrictive); see below for details.
    [However, none of that term is relevant at this point in time. All of these restric-
    tively licenced software components which he talks about have been removed
    from OpenSSH, i.e.,
    - RSA is no longer included, found in the OpenSSL library
    - IDEA is no longer included, its use is deprecated 
    						
    							Appendix
    308
    9
    - DES is now external, in the OpenSSL library
    - GMP is no longer used, and instead we call BN code from OpenSSL
    - Zlib is now external, in a library
    - The make-ssh-known-hosts script is no longer included
    - TSS has been removed
    - MD5 is now external, in the OpenSSL library
    - RC4 support has been replaced with ARC4 support from OpenSSL
    - Blowfish is now external, in the OpenSSL library
    [The licence continues]
    Note that any information and cryptographic algorithms used in this software
    are publicly available on the Internet and at any major bookstore, scientific li-
    brary, and patent office worldwide. More information can be found e.g. at ht-
    tp://www.cs.hut.fi/crypto.
    The legal status of this program is some combination of all these permissions
    and restrictions. Use only at your own responsibility. You will be responsible for
    any legal consequences yourself; I am not making any claims whether possess-
    ing or using this is legal or not in your country, and I am not taking any respon-
    sibility on your behalf.
    NO WARRANTY
    BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
    WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLI-
    CABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COP-
    YRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM
    AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IM-
    PLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
    OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
    THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
    PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
    YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
    CORRECTION. 
    						
    							Information about Installed Software
    309
    9
    IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO
    IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY
    WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT-
    TED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GEN-
    ERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
    OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT
    NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCU-
    RATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
    OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
    IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSI-
    BILITY OF SUCH DAMAGES.
    2)
    The 32-bit CRC compensation attack detector in deattack.c was contributed by
    CORE SDI S.A. under a BSD-style license.
    Cryptographic attack detector for ssh - source code
    Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
    All rights reserved. Redistribution and use in source and binary forms, with or
    without modification, are permitted provided that this copyright notice is re-
    tained.
    THIS SOFTWARE IS PROVIDED ``AS IS AND ANY EXPRESS OR IMPLIED
    WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
    LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLA-
    RY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MIS-
    USE OF THIS SOFTWARE.
    Ariel Futoransky 
    
    3)
    One component of the ssh source code is under a 3-clause BSD license, held by
    the University of California, since we pulled these parts from original Berkeley
    code.
    Copyright (c) 1983, 1990, 1992, 1993, 1995
    The Regents of the University of California. All rights reserved.
    Redistribution and use in source and binary forms, with or without modifica-
    tion, are permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list
    of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
    this list of conditions and the following disclaimer in the documentation and/or
    other materials provided with the distribution. 
    						
    							Appendix
    310
    9
    3. Neither the name of the University nor the names of its contributors may be
    used to endorse or promote products derived from this software without specif-
    ic prior written permission.
    THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS
    ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
    NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
    AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
    EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
    DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE-
    QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
    MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
    ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILI-
    TY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
    ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
    THE POSSIBILITY OF SUCH DAMAGE.
    4)
    Remaining components of the software are provided under a standard 2-term
    BSD licence with the following names as copyright holders:
    Markus Friedl
    Theo de Raadt
    Niels Provos
    Dug Song
    Kevin Steves
    Daniel Kouril
    Wesley Griffin
    Per Allansson
    Jason Downs
    Solar Designer
    Todd C. Miller
    Redistribution and use in source and binary forms, with or without modifica-
    tion, are permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list
    of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
    this list of conditions and the following disclaimer in the documentation and/or
    other materials provided with the distribution. 
    						
    All Ricoh manuals Comments (0)

    Related Manuals for Ricoh Mp C4500 Instruction Manual