Savin 4800WD User manual

i
Manuals for This Machine
The following manuals describe the operational procedures of this machine. For
particular functions, see the relevant parts of the manual.
Note
❒Manuals provided are specific to machine type.
❒Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as
a PDF file.
❒Two CD-ROMs are provided:
• CD-ROM 1 “Operating Instructions”
• CD-ROM 2 “Scanner Driver and Utilities”
❖
❖❖
❖General Settings Guide (this manual)
Provides an overview of the machine and describes System Settings (such as
Tray Paper Settings), Document Server functions, and troubleshooting.
Refer to this manual for Address Book procedures such as registering e-mail
address, and user codes.
❖
❖❖
❖Security Reference
This manual is for administrators of this machine. It describes security func-
tions that the administrators can use to protect data from being tampered, or
prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖
❖❖
❖Network Guide (PDF file - CD-ROM1)
Provides information about configuring and operating the scanner (Type 480)
in a network environment.
For details about network settings of the scanner (RW480) and printer
(RW480), see the manual that comes with the related option.
❖
❖❖
❖Copy Reference
Describes operations, functions, and troubleshooting for the machine's copier
function.
❖
❖❖
❖Scanner Reference (Scanner Unit Type 480) (PDF file - CD-ROM1)
Describes operations, functions, and troubleshooting for the machine's scan-
ner function.
DolphinC2_EN_zentai_F_pre_FM.book Page i Friday, February 25, 2005 7:09 PM

ii
❖
❖❖
❖Manuals for DeskTopBinder Lite
DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner
Driver and Utilities”.
•DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2)
Describes installation of, and the operating environment for DeskTop-
Binder Lite in detail. This guide can be displayed from the [Setup]display
when DeskTopBinder Lite is installed.
•DeskTopBinder Introduction Guide (PDF file - CD-ROM2)
Describes operations of DeskTopBinder Lite and provides an overview of
its functions. This guide is added to the [Start]menu when DeskTopBinder
Lite is installed.
•Auto Document Link Guide (PDF file - CD-ROM2)
Describes operations and functions of Auto Document Link installed with
DeskTopBinder Lite. This guide is added to the [Start]menu when Desk-
TopBinder Lite is installed.
❖
❖❖
❖Other manuals
•Manuals for Printer (RW480) function.
•Manuals for Scanner (RW480) function.
DolphinC2_EN_zentai_F_pre_FM.book Page ii Friday, February 25, 2005 7:09 PM

iii
What You Can Do with This Machine
The following introduces the functions of this machine, and the relevant manu-
als containing detailed information about them.
Products marked with * are optional. For details about optional products, see
p.22 “Options”, or contact your local dealer.
Note
❒For functions of printer (RW480) and scanner (RW480), see manuals that
come with those options.
❒Scanner functions stated below apply to Scanner Unit Type 480 only.
Copier, Printer, and Scanner
Functions
This machine provides copier, print-
er* and scanner* functions.
•You can make copies of originals.
See Copy Reference.
•You can print documents created
using applications. See the rele-
vant manuals of the printer.
•You can scan originals and send
the scan file to a computer. See
Scanner Reference.
Utilizing Stored Documents
•You can store files of originals
scanned by this machine, or files
sent from other computers, onto
the hard disk of the machine. You
can print the stored documents, as
well as change print settings and
print multiple documents (Docu-
ment Server). See p.39 “Document
Server”.
•With DeskTopBinder Profession-
al*/Lite, you can search, check,
print, and delete stored documents
using your computer. You can also
retrieve stored documents scanned
in scanner mode. With File Format
Converter*, you can even down-
load documents stored in copy and
printer functions to your comput-
er. See Network Guide and Scanner
Reference.
AGL010S
AGL011S
DolphinC2_EN_zentai_F_pre_FM.book Page iii Friday, February 25, 2005 7:09 PM

iv
Using the Scanner in a
Network Environment
•You can send scanned documents
to other network computers using
e-mail (Sending stored scan file by
e-mail). See Scanner Reference.
•With the ScanRouter delivery soft-
ware, you can store scanned docu-
ments in specified destinations on
network computers (File storage).
See Scanner Reference.
•You can send scanned documents
to other network folders (Scan to
Folder). See Scanner Reference.
Administrating the Machine/
Protecting Documents
(Security Functions)
•You can protect documents from
unauthorized access and stop
them from being copied without
permission. See Security Reference.
•You can control the use of the ma-
chine, as well as prevent machine
settings from being changed with-
out authorization. See Security Ref-
erence.
•By setting passwords, you can pre-
vent unauthorized access via the
network. See Security Reference.
•You can erase the data on the hard
disk to prevent the information
from leaking out. See the manual
for the DataOverWriteSecurity
unit* and Security Reference.
AGL012S
AGL013S
DolphinC2_EN_zentai_F_pre_FM.book Page iv Friday, February 25, 2005 7:09 PM

v
Monitoring the Machine Via
Computer
You can monitor machine status and
change settings using a computer.
•
Using SmartDeviceMonitor for Ad-
min,
or a Web browser, you can
use a computer to view the ma-
chine's status, such as checking on
paper quantities or misfeeds. See
Network Guide.
•You can use a Web browser to
make network settings. See Net-
work Guide.
•You can also use a Web browser to
register and manage items such as
user codes, e-mail addresses, and
folders in the Address Book. See
the Web browser's Help.
AGL014S
DolphinC2_EN_zentai_F_pre_FM.book Page v Friday, February 25, 2005 7:09 PM

vi
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
What You Can Do with This Machine..................................................................iii
Copier, Printer, and Scanner Functions .................................................................... iii
Utilizing Stored Documents....................................................................................... iii
Using the Scanner in a Network Environment .......................................................... iv
Administrating the Machine/ Protecting Documents (Security Functions) ................ iv
Monitoring the Machine Via Computer....................................................................... v
Notice......................................................................................................................1
Copyrights and Trademarks .................................................................................4
Trademarks ................................................................................................................4
Information about Installed Software..........................................................................5
How to Read This Manual ...................................................................................11
Symbols ...................................................................................................................11
Names of Major Options ..........................................................................................12
Terms .......................................................................................................................12
Safety Information ...............................................................................................13
Safety During Operation...........................................................................................13
Positions of R
RR
RWARNING and R
RR
RCAUTION Labels ...........................................15
ENERGY STAR Program .....................................................................................17
1. Getting Started
Guide to Components .........................................................................................19
Options.....................................................................................................................22
Control Panel........................................................................................................25
Display Panel ...........................................................................................................26
When the Authentication Screen is displayed..........................................................27
Turning On the Power .........................................................................................29
Turning On the Main Power .....................................................................................29
Turning On the Power ..............................................................................................29
Turning Off the Power ..............................................................................................30
Turning Off the Main Power .....................................................................................30
Saving Energy..........................................................................................................31
Anti-humidity Heater Switch .....................................................................................32
2. Combined Function Operations
Switching between Functions ............................................................................33
Job List.....................................................................................................................33
Multi-Access.........................................................................................................36
DolphinC2_EN_zentai_F_pre_FM.book Page vi Friday, February 25, 2005 7:09 PM

vii
3. Document Server
Relationship between Document Server and Other Functions .......................39
Document Server Display ........................................................................................40
Using the Document Server................................................................................41
Storing Data .............................................................................................................41
Changing a Stored Document's File Name, User Name, or Password....................44
Searching for Stored Documents.............................................................................44
Printing Stored Documents ......................................................................................45
Deleting Stored Documents .....................................................................................48
Viewing Stored Documents Using a Web Browser ..................................................49
Downloading Stored Documents..............................................................................49
Settings for the Document Server......................................................................50
4. User Tools (System Settings)
User Tools Menu (System Settings)...................................................................51
Accessing User Tools (System Settings) ..........................................................55
Changing Default Settings .......................................................................................55
Exiting User Tools ....................................................................................................55
Settings You Can Change with User Tools .......................................................56
General Features .....................................................................................................56
Tray Paper Settings .................................................................................................62
Timer Settings ..........................................................................................................63
Administrator Tools ..................................................................................................65
5. Registering Addresses and Users
Address Book.......................................................................................................71
Registering Names ..............................................................................................74
Registering a Name .................................................................................................74
Changing a Registered Name..................................................................................75
Deleting a Registered Name ....................................................................................75
Registering User Codes ......................................................................................76
Registering a New User Code..................................................................................76
Changing a User Code.............................................................................................77
Deleting a User Code...............................................................................................77
Displaying the Counter for Each User Code ............................................................78
Printing the Counter for Each User Code.................................................................78
Clearing the Counters ..............................................................................................79
E-mail Destination................................................................................................80
Registering an E-mail Destination............................................................................80
Changing a Registered E-mail Destination ..............................................................81
Deleting a Registered E-mail Destination ................................................................82
Registering Folders .............................................................................................83
Using SMB to Connect.............................................................................................83
Using FTP to Connect..............................................................................................87
DolphinC2_EN_zentai_F_pre_FM.book Page vii Friday, February 25, 2005 7:09 PM

viii
Registering Names to a Group ...........................................................................90
Registering a New Group.........................................................................................90
Registering Names to a Group.................................................................................91
Adding a Group to Another Group ...........................................................................91
Displaying Names Registered in Groups .................................................................92
Removing a Name from a Group .............................................................................92
Deleting a Group within a Group..............................................................................93
Changing a Group Name .........................................................................................93
Deleting a Group......................................................................................................94
Registering a Protection Code ...........................................................................95
Registering a Protection Code for a Name in the Address Book .............................95
Registering a Protection Code for a Group ..............................................................96
Registering SMTP and LDAP Authentication....................................................97
SMTP Authentication ...............................................................................................97
LDAP Authentication ................................................................................................98
6. Troubleshooting
If Your Machine Does Not Operate As You Want............................................101
General ..................................................................................................................101
Document Server ...................................................................................................103
Loading Paper....................................................................................................105
Loading Paper Roll.................................................................................................106
Loading Cut Paper .................................................................................................107
D
DD
DAdding Toner..................................................................................................108
x
xx
xClearing Misfeeds ..........................................................................................110
Original Misfeeds (P)..............................................................................................111
Paper Misfeeds in the Paper Tray (A1, A2) ...........................................................111
Paper Misfeeds in the Paper Bypass (A3, B).........................................................113
Paper Misfeeds in the Rear Paper Output (C) .......................................................114
Changing the Paper Size...................................................................................115
Changing the Paper Roll Size................................................................................115
Changing the Cut Paper Size.................................................................................117
7. Remarks
Dos and Don'ts...................................................................................................119
Toner...................................................................................................................120
Handling Toner.......................................................................................................120
Toner Storage ........................................................................................................120
Used Toner ............................................................................................................120
Where to Put Your Machine ..............................................................................121
Machine Environment ............................................................................................121
Moving....................................................................................................................121
Power Connection..................................................................................................122
Clearance Around the Machine..............................................................................122
Maintaining Your Machine ................................................................................123
Cleaning inside the Original Cover.........................................................................123
Cleaning the Imaging Unit......................................................................................124
DolphinC2_EN_zentai_F_pre_FM.book Page viii Friday, February 25, 2005 7:09 PM

ix
Other Functions .................................................................................................125
Inquiry ....................................................................................................................125
Changing the Display Language ............................................................................126
Counter ...............................................................................................................127
Displaying the Total Counter..................................................................................127
8. Entering Text
Entering Text ...................................................................................................... 129
Available Characters ..............................................................................................129
Keys .......................................................................................................................129
Entering Text..........................................................................................................130
9. Specifications
Main Unit.............................................................................................................131
Options ...............................................................................................................135
Roll Feeder Type 480.............................................................................................135
Paper Cassette Type 480 ......................................................................................135
Carrier Sheet..........................................................................................................136
Roll Holder Unit Type A..........................................................................................136
Original Tray Type G..............................................................................................136
Copy Paper .........................................................................................................137
Recommended Size and Type...............................................................................137
Unusable Paper .....................................................................................................140
Paper Storage ........................................................................................................141
Handling paper...................................................................................................142
INDEX....................................................................................................... 143
DolphinC2_EN_zentai_F_pre_FM.book Page ix Friday, February 25, 2005 7:09 PM

x
DolphinC2_EN_zentai_F_pre_FM.book Page x Friday, February 25, 2005 7:09 PM

1
Notice
Notice To Wireless LAN Interface (optional) Users
Notes to users
It is strictly forbidden to use antenna(s) except designated.
AThe antenna(s) of this device must not be co-located or operating in conjunc-
tion with any other antenna or transmitter.
BThis equipment complies with FCC RF radiation exposure limits set forth for
an uncontrolled environment. End users must follow the specific operating
instructions for satisfying RF exposure compliance.
Notes to users in the United States of America
Notice:
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed
to provide reasonable protection against harmful interference in a residential in-
stallation. This equipment generates, uses and can radiate radio frequency ener-
gy and, if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be deter-
mined by turning the equipment off and on, the user is encouraged to try to cor-
rect the interference by one more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and receiver.
•Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
This device complies with part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must ac-
cept any interference received, including interference that may cause undesired
operation.
Warning
Changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate the equipment.
DolphinC2_EN_zentai_F_pre_FM.book Page 1 Friday, February 25, 2005 7:09 PM

2
Note to users in Canada
Note:
This Class B digital apparatus complies with Canadian ICES-003.
Operation is subject to the following two conditions:
(1) This device may not cause interference, and (2) this device must accept any
interference, including interference that may cause undesired operation of the
device.
IEEE 802.11b Interface Unit Type H:
This device complies with RSS-210 of Industry Canada.
The term “IC:”before the certification/registration number only signifies that
the Industry Canada technical specifications were met.
To prevent radio interference to the licensed service, this device is intended to
be operated indoors and away from windows to provide maximum shielding.
Equipment (or its transmit antenna) that is installed outdoors is subject to licens-
ing.
To reduce potential radio interference to other users, the antenna type and its
gain should be so chosen that the equivalent isotropically radiated power (EIRP)
is not more than that required for successful communication.
This device has been designed to operate with an antenna having a maximum
gain of [0.45] dBi. Antenna having a higher gain is strictly prohibited per regu-
lations of Industry Canada. The required antenna impedance is [50] ohms.
DolphinC2_EN_zentai_F_pre_FM.book Page 2 Friday, February 25, 2005 7:09 PM

3
Remarque concernant les utilisateurs au Canada
Avertissement:
Cet appareil numérique de la classe B est conforme ála norme NMB-003 du Can-
ada.
L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1)
il ne doit pas produire de brouillage et (2) l'utilisateur du dispositif doit être prêt
áaccepter tout brouillage radioélectrique reçu, même si ce brouillage est suscep-
tible de compromettre le fonctionnement du dispositif.
IEEE 802.11b Interface Unit Type H:
Ce dispositif est conforme ála norme CNR-210 d'Industrie Canada.
L'expression «IC:»avant le numéro d'homologation/enregistrement signifie
seulement que les spécifications techniques d'Industrie Canada ont étére-
spectées.
Pour empêcher que cet appareil cause du brouillage au service faisant l'objet
d'une licence, il doit être utiliséál'intérieur et devrait être placéloin des fenêtres
afin de fournir un écran de blindage maximal.
Si le matériel (ou son antenne d'emission) est installe ál'extérieur, il doit faire
l'objet d'une licence.
Afin de réduire le risque d'interférence aux autres utilisateurs, le type d'antenne
et son gain doivent être choisis de façon áce que la puissance isotrope rayonnée
équivalente (p.i.r.e.) ne soit pas supérieure au niveau requis pour obtenir une
communication satisfaisante.
Ce dispositif a étéconçu pour fonctionner avec une antenne ayant un gain max-
imal de [0.45] dBi.Une antenne ayant un gain plus élevéest strictement interdite
par les réglements d'Industrie Canada.L'impédance d'antenne requise est [50]
ohms.
DolphinC2_EN_zentai_F_pre_FM.book Page 3 Friday, February 25, 2005 7:09 PM

4
Copyrights and Trademarks
Trademarks
Microsoft®, Windows®and Windows NT®are registered trademarks of Mi-
crosoft Corporation in the United States and/or other countries.
Acrobat®is a registered trademark of Adobe Systems Incorporated.
Other product names used herein are for identification purposes only and might
be trademarks of their respective companies. We disclaim any and all rights to
those marks.
The proper names of the Windows operating systems are as follows:
•The product name of Windows®95 is Microsoft®Windows®95
•The product name of Windows®98 is Microsoft®Windows®98
•The product name of Windows®Me is Microsoft®Windows®Millennium
Edition (Windows Me)
•The product names of Windows®2000 are as follows:
Microsoft®Windows®2000 Advanced Server
Microsoft®Windows®2000 Server
Microsoft®Windows®2000 Professional
•The product names of Windows®XP are as follows:
Microsoft®Windows®XP Professional
Microsoft®Windows®XP Home Edition
•The product names of Windows Server™2003 are as follows:
Microsoft®Windows Server™2003 Standard Edition
Microsoft®Windows Server™2003 Enterprise Edition
Microsoft®Windows Server™2003 Web Edition
•The product names of Windows®NT are as follows:
Microsoft®Windows NT®Server 4.0
Microsoft®Windows NT®Workstation 4.0
DolphinC2_EN_zentai_F_pre_FM.book Page 4 Friday, February 25, 2005 7:09 PM

5
Information about Installed Software
expat
•The software including controller, etc. (hereinafter "software") installed on
this product uses the expat under the conditions mentioned below.
•The product manufacturer provides warranty and support to the software of
the product including the expat, and the product manufacturer makes the ini-
tial developer and copyright holder of the expat, free from these obligations.
•Information relating to the expat is available at:
http://expat.sourceforge.net/
Copyright © 1998, 1999, 2000 Thai Open Source Software Centre, Ltd. and Clark
Cooper.
Copyright © 2001, 2002 Expat maintainers.
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so, sub-
ject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AU-
THORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAG-
ES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFT-
WARE.
NetBSD
1. Copyright Notice of NetBSD
For all users to use this product:
This product contains NetBSD operating system:
For the most part, the software constituting the NetBSD operating system is not
in the public domain; its authors retain their copyright.
The following text shows the copyright notice used for many of the NetBSD
source code. For exact copyright notice applicable for each of the files/binaries,
the source code tree must be consulted.
A full source code can be found at http://www.netbsd.org/.
Copyright © 1999, 2000 The NetBSD Foundation, Inc.
All rights reserved.
DolphinC2_EN_zentai_F_pre_FM.book Page 5 Friday, February 25, 2005 7:09 PM

6
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
ARedistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
BRedistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
CAll advertising materials mentioning features or use of this software must
display the following acknowledgment:
This product includes software developed by The NetBSD Foundation, Inc.
and its contributors.
DNeither the name of The NetBSD Foundation nor the names of its contribu-
tors may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEM-
PLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMIT-
ED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CON-
TRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTH-
ERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2.Authors Name List
All product names mentioned herein are trademarks of their respective owners.
The following notices are required to satisfy the license terms of the software
that we have mentioned in this document:
•This product includes software developed by the University of California,
Berkeley and its contributors.
•This product includes software developed by Jonathan R. Stone for the NetB-
SD Project.
•This product includes software developed by the NetBSD Foundation, Inc.
and its contributors.
•This product includes software developed by Manuel Bouyer.
•This product includes software developed by Charles Hannum.
•This product includes software developed by Charles M. Hannum.
•This product includes software developed by Christopher G. Demetriou.
•This product includes software developed by TooLs GmbH.
•This product includes software developed by Terrence R. Lambert.
•This product includes software developed by Adam Glass and Charles Han-
num.
•This product includes software developed by Theo de Raadt.
DolphinC2_EN_zentai_F_pre_FM.book Page 6 Friday, February 25, 2005 7:09 PM

7
•This product includes software developed by Jonathan Stone and Jason R.
Thorpe for the NetBSD Project.
•This product includes software developed by the University of California,
Lawrence Berkeley Laboratory and its contributors.
•This product includes software developed by Christos Zoulas.
•This product includes software developed by Christopher G. Demetriou for
the NetBSD Project.
•This product includes software developed by Paul Kranenburg.
•This product includes software developed by Adam Glass.
•This product includes software developed by Jonathan Stone.
•This product includes software developed by Jonathan Stone for the NetBSD
Project.
•This product includes software developed by Winning Strategies, Inc.
•This product includes software developed by Frank van der Linden for the
NetBSD Project.
•This product includes software developed for the NetBSD Project by Frank
van der Linden
•This product includes software developed for the NetBSD Project by Jason R.
Thorpe.
•The software was developed by the University of California, Berkeley.
•This product includes software developed by Chris Provenzano, the Univer-
sity of California, Berkeley, and contributors.
Sablotron
Sablotron (Version 0.82) Copyright © 2000 Ginger Alliance Ltd. All Rights Re-
served
a) The application software installed on this product includes the Sablotron soft-
ware Version 0.82 (hereinafter, "Sablotron 0.82"), with modifications made by
the product manufacturer. The original code of the Sablotron 0.82 is provided by
Ginger Alliance Ltd., the initial developer, and the modified code of the Sa-
blotron 0.82 has been derived from such original code provided by Ginger Alli-
ance Ltd.
b) The product manufacturer provides warranty and support to the application
software of this product including the Sablotron 0.82 as modified, and the prod-
uct manufacturer makes Ginger Alliance Ltd., the initial developer of the Sa-
blotron 0.82, free from these obligations.
c) The Sablotron 0.82 and the modifications thereof are made available under the
terms of Mozilla Public License Version 1.1 (hereinafter, "MPL 1.1"), and the ap-
plication software of this product constitutes the "Larger Work" as defined in
MPL 1.1. The application software of this product except for the Sablotron 0.82
as modified is licensed by the product manufacturer under separate agree-
ment(s).
d) The source code of the modified code of the Sablotron 0.82 is available at: ht-
tp://support-download.com/services/device/sablot/notice082.html
DolphinC2_EN_zentai_F_pre_FM.book Page 7 Friday, February 25, 2005 7:09 PM

8
e) The source code of the Sablotron software is available at: http://www.ginger-
all.com
f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html
JPEG LIBRARY
•The software installed on this product is based in part on the work of the In-
dependent JPEG Group.
SASL
CMU libsasl
Tim Martin
Rob Earhart
Rob Siemborski
Copyright © 2001 Carnegie Mellon University. All rights reserved.
Redistribution and use in source and binary forms, with or without modifica-
tion, are permitted provided that the following conditions are met:
ARedistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
BRedistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
CThe name "Carnegie Mellon University" must not be used to endorse or pro-
mote products derived from this software without prior written permission.
For permission or any other legal details, please contact:
Office of Technology Transfer
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15213-3890
(412) 268-4387, fax: (412) 268-7395
DRedistributions of any form whatsoever must retain the following acknowl-
edgment:
"This product includes software developed by Computing Services at Carn-
egie Mellon University (http://www.cmu.edu/computing/)."
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE
MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CON-
SEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
DolphinC2_EN_zentai_F_pre_FM.book Page 8 Friday, February 25, 2005 7:09 PM

9
MD4
Copyright © 1990-2, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD4 Message-
Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the mer-
chantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
MD5
Copyright © 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such
works are identified as "derived from the RSA Data Security, Inc. MD5 Message-
Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the mer-
chantability of this software or the suitability of this software for any particular
purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
DolphinC2_EN_zentai_F_pre_FM.book Page 9 Friday, February 25, 2005 7:09 PM

10
RSA BSAFE®
•This product includes RSA BSAFE®cryptographic or security protocol soft-
ware from RSA Security Inc.
•RSA and BSAFE are registered trademarks of RSA Security Inc. in the United
States and/or other countries.
•RSA Security Inc. All rights reserved.
Samba(Ver 2.2.2-ja-1.1)
For SMB transmission, this machine uses Samba ver 2.2.2-ja-1.1 (hereinafter re-
ferred to as Samba 2.2.2-ja-1.1).
Copyright © Andrew Tridgell 1994-1998
This program is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILI-
TY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License for more details.
You should have received a copy of the GNU General Public License along with
this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave,
Cambridge, MA 02139, USA
Note
❒The source code for SMB transmission by this machine can be downloaded
from the following website: http://support-download.com/services/scbs
DolphinC2_EN_zentai_F_pre_FM.book Page 10 Friday, February 25, 2005 7:09 PM
Other manuals for 4800WD
1
Table of contents
Other Savin All In One Printer manuals

Savin
Savin SDC103 User manual

Savin
Savin 3725 User manual

Savin
Savin Aficio 2045e User manual

Savin
Savin Fax Option Type 1027 User manual

Savin
Savin 8025e User manual

Savin
Savin 4800WD User manual

Savin
Savin SP 3400SF User manual

Savin
Savin 3699 User manual

Savin
Savin 9920DP User manual

Savin
Savin 9025b User manual