139732
69
Verklein
Vergroot
Pagina terug
1/70
Pagina verder
LICENSE
0
Individual source code les are copyright MIT, Cygnus
Support, OpenVision, Oracle, Sun Soft, FundsXpress, and
others.
Project Athena, Athena, Athena MUSE, Discuss,
Hesiod, Kerberos, Moira, and Zephyr are trademarks of
the Massachusetts Institute of Technology (MIT). No
commercial use of these trademarks may be made
without prior written permission of MIT.
“Commercial use” means use of a name in a product or
other for-prot manner. It does NOT prevent a commercial
rm from referring to the MIT trademarks in order to
convey information (although in doing so, recognition of
their trademark status should be given).
The following copyright and permission notice applies to
the OpenVision Kerberos Administration system located
in kadmin/create, kadmin/dbutil, kadmin/passwd, kadmin/
server, lib/kadm5, and portions of lib/rpc:
Copyright, OpenVision Technologies, Inc., 1996, All
Rights Reserved
WARNING: Retrieving the OpenVision Kerberos
Administration system source code, as described below,
indicates your acceptance of the following terms. If you
do not agree to the following terms, do not retrieve the
OpenVision Kerberos administration system.
You may freely use and distribute the Source Code
and Object Code compiled from it, with or without
modication, but this Source Code is provided to you
AS IS” EXCLUSIVE OF ANY WARRANTY, INCLUDING,
WITHOUT LIMITATION, ANY WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE, OR ANY OTHER WARRANTY, WHETHER
EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION
HAVE ANY LIABILITY FOR ANY LOST PROFITS, LOSS OF
DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES, OR FOR ANY SPECIAL,
INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THIS AGREEMENT, INCLUDING, WITHOUT
LIMITATION, THOSE RESULTING FROM THE USE OF
THE SOURCE CODE, OR THE FAILURE OF THE SOURCE
CODE TO PERFORM, OR FOR ANY OTHER REASON.
OpenVision retains all copyrights in the donated Source
Code. OpenVision also retains copyright to derivative
works of the Source Code, whether created by
OpenVision or by a third party. The OpenVision copyright
notice must be preserved if derivative works are made
based on the donated Source Code.
OpenVision Technologies, Inc. has donated this
Kerberos Administration system to MIT for inclusion
in the standard Kerberos 5 distribution. This donation
underscores our commitment to continuing Kerberos
technology development and our gratitude for the
valuable work which has been performed by MIT and
the Kerberos community.
Portions contributed by Matt Crawford <crawdad@fnal.
gov> were work performed at Fermi National Accelerator
Laboratory, which is operated by Universities Research
Association, Inc., under contract DE-AC02-76CHO3000
with the U.S. Department of Energy.
The implementation of the Yarrow pseudo-random number
generator in src/lib/crypto/yarrow has the following
copyright:
Copyright 2000 by Zero-Knowledge Systems, Inc.
Permission to use, copy, modify, distribute, and sell this
software and its documentation for any purpose is hereby
granted without fee, provided that the above copyright
notice appear in all copies and that both that copyright
notice and this permission notice appear in supporting
documentation, and that the name of Zero-Knowledge
Systems, Inc. not be used in advertising or publicity
pertaining to distribution of the software without specic,
written prior permission. Zero-Knowledge Systems, Inc.
makes no representations about the suitability of this
software for any purpose. It is provided “as is” without
express or implied warranty.
ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL
WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH
THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementation of the AES encryption algorithm in
src/lib/crypto/aes has the following copyright:
Copyright (c) 2001, Dr Brian Gladman <brg@gladman.
uk.net>, Worcester, UK.
All rights reserved.
LICENSE TERMS
The free distribution and use of this software in both
source and binary form is allowed (with or without
changes) provided that:
1. distributions of this source code include the above
copyright notice, this list of conditions and the
following disclaimer;
2. distributions in binary form include the above
copyright notice, this list of conditions and the
following disclaimer in the documentation and/or
other associated materials;
3. the copyright holder’s name is not used to endorse
products built using this software without specic
written permission.
DISCLAIMER
This software is provided “as is” with no explcit or implied
warranties in respect of any properties, including, but not
limited to, correctness and tness for purpose.
The implementation of the RPCSEC_GSS authentication
avor in src/lib/rpc has the following copyright:
Copyright (c) 2000 The Regents of the University of
Michigan.
All rights reserved.
Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
All rights reserved, all wrongs reversed.
Redistribution and use in source and binary forms, with
or without modication, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the
above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
3. Neither the name of the University nor the names of
its contributors may be used to endorse or promote
products derived from this software without specic
prior written permission.
THIS SOFTWARE IS PROVIDED AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Acknowledgments
Appreciation Time!!!! There are far too many people to
try to thank them all; many people have contributed to
the development of Kerberos V5. This is only a partial
listing....
Thanks to Kevin Coffman and the CITI group at the
University of Michigan for providing patches for
implementing RPCSEC_GSS authentication in the RPC
library.
Thanks to Derrick Schommer for reporting multiple
memory leaks.
Thanks to Quanah Gibson-Mount of Stanford University
for helping exercise the thread support code.
Thanks to Michael Tautschnig for reporting the heap buffer
overow inthe password history mechanism. [MITKRB5-
SA-2004-004]
Thanks to Wyllys Ingersoll for nding a buffer-size problem
in theRPCSEC_GSS implementation.
Thanks to the members of the Kerberos V5 development
team at MIT, both past and present: Danilo Almeida, Jeffrey
Altman, Jay Berkenbilt, Richard Basch, Mitch Berger, John
Carr, Don Davis, Alexandra Ellwood, Nancy Gilman, Matt
Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva
Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King,
John Kohl, Peter Litwack, Scott McGuire, Kevin Mitchell,
Cliff Neuman, Paul Park, Ezra Peisach, Chris Provenzano,
Ken Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Brad
Thompson, Harry Tsai, Ted Ts’o, Marshall Vale, Tom Yu.
Very special thanks go to Marshall Vale, our departing
team leader.
Over the past few years, Marshall has been extremely
valuable to us as mentor, advisor, manager, and friend.
Marshall’s devotion as a champion of Kerberos has helped
our team immensely through many trials and hardships.
We will miss him tremendously, and we wish him the best
in his future endeavors.
n
Exhibit-U
Copyright (c) 1989 The Regents of the University of
California.
All rights reserved.
This code is derived from software contributed to Berkeley
by Mike Muuss.
Redistribution and use in source and binary forms, with
or without modication, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the
above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
3. All advertising materials mentioning features or
use of this software must display the following
acknowledgement:
This product includes software developed by the
University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of
its contributors may be used to endorse or promote
products derived from this software without specic
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND
CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
License Information for the Software
Used in the Unit
About GPL (GNU-General Public
License), LGPL (GNU Lesser General
Public License) License
This product uses GPL/LGPL software and software
made by other companies.
After you purchase this product, you may procure,
modify or distribute the source code of the GPL/
LGPL software that is used in the product.
DENON provides the source code based on the
GPL and LPGL licenses at the actual cost upon your
request to our customer service center. However,
note that we make no guarantees concerning the
source code. Please also understand that we do
not offer support for the contents of the source
code.
69

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Denon dbp 4010ud bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Denon dbp 4010ud in de taal/talen: Nederlands, Duits, Engels, Frans, Italiaans als bijlage per email.

De handleiding is 11,44 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

loading

Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info