- 56 -
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the
terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are
linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the
Library to produce a work containing portions of the Library, and distribute that work under terms of your choice,
provided that the terms permit modification of the work for the customer's own use and reverse engineering for
debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and
its use are covered by this License. You must supply a copy of this License. If the work during execution
displays copyright notices, you must include the copyright notice for the Library among them, as well as a
reference directing the user to the copy of this License. Also, you must do one of these things:
•
a) Accompany the work with the complete corresponding machine-readable source code for the
Library including whatever changes were used in the work (which must be distributed under Sections 1
and 2 above); and, if the work is an executable linked with the Library, with the complete
machine-readable "work that uses the Library", as object code and/or source code, so that the user
can modify the Library and then relink to produce a modified executable containing the modified
Library. (It is understood that the user who changes the contents of definitions files in the Library will
not necessarily be able to recompile the application to use the modified definitions.)
•
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one
that (1) uses at run time a copy of the library already present on the user's computer system, rather
than copying library functions into the executable, and (2) will operate properly with a modified version
of the library, if the user installs one, as long as the modified version is interface-compatible with the
version that the work was made with.
•
c) Accompany the work with a written offer, valid for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a charge no more than the cost of performing this
distribution.
•
d) If distribution of the work is made by offering access to copy from a designated place, offer
equivalent access to copy the above specified materials from the same place.
•
e) Verify that the user has already received a copy of these materials or that you have already sent this
user a copy.
For an executable, the required form of the "work that uses the Library" must include any data and utility
programs needed for reproducing the executable from it. However, as a special exception, the materials to be
distributed need not include anything that is normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that
component itself accompanies the executable.
Summary of Contents for LBP710Cx
Page 1: ...LBP712Cx LBP710Cx User s Guide USRMA 0722 00 2016 04 en Copyright CANON INC 2016 ...
Page 51: ...Paper P 620 Basic Operations 45 ...
Page 58: ...4 on 1 Postcard Insert the postcard with the upper end toward the machine Basic Operations 52 ...
Page 78: ...Printing a Document 72 ...
Page 93: ...LINKS Basic Printing Operations P 73 Printing a Document 87 ...
Page 97: ...LINKS Basic Printing Operations P 73 Enlarging or Reducing P 82 Printing a Document 91 ...
Page 108: ...LINKS Basic Printing Operations P 73 Printing a Document 102 ...
Page 140: ...LINKS Using the Encrypted Print P 135 Installing an SD Card P 633 Printing a Document 134 ...
Page 195: ...LINKS Connecting to a Network P 186 Network 189 ...
Page 250: ...LINKS Entering Sleep Mode P 63 Network 244 ...
Page 290: ...Printing a Document Stored in the Machine Stored Job Print P 136 Security 284 ...
Page 296: ... Functions of the Keys Operation Panel P 24 Security 290 ...
Page 334: ...Using TLS for Encrypted Communications P 297 Configuring IPSec Settings P 301 Security 328 ...
Page 344: ...Using Remote UI 338 ...
Page 359: ...LINKS Remote UI Screens P 339 Using Remote UI 353 ...
Page 383: ...Paper Source 0YSF 05E See Select Feeder Menu P 500 Setting Menu List 377 ...
Page 516: ...Troubleshooting 510 ...
Page 600: ...LINKS Utility Menu P 491 Job Menu P 496 Maintenance 594 ...
Page 611: ...Third Party Software 0YSF 090 Appendix 605 ...
Page 630: ...Appendix 624 ...
Page 651: ...Manual Display Settings 0YSF 091 Appendix 645 ...
Page 675: ...Scalable Fonts PCL Appendix 669 ...
Page 676: ...Appendix 670 ...
Page 677: ...Appendix 671 ...
Page 678: ...OCR Code Scalable Fonts PCL Bitmapped Fonts PCL Appendix 672 ...
Page 701: ... 16 MD4 RSA Data Security Inc MD4 Message Digest Algorithm ...
Page 712: ... 27 including the GNU Public Licence ...
Page 736: ... 51 SOFTWARE ...
Page 749: ...Search Enter keyword s here 1 ...
Page 752: ...2 ...
Page 762: ...12 ...
Page 768: ...3 Click Delivered Update 4 Click Apply Firmware 5 Confirm the firmware to apply click Yes 5 ...
Page 770: ...3 Click Delivered Update 4 Click Delete Firmware 7 ...
Page 789: ...Search Enter keyword s here 1 ...
Page 810: ...Starting MEAP Applications Stopping MEAP Applications Starting Stopping MEAP Applications 10 ...
Page 818: ...4 Click License Management 5 18 ...
Page 821: ...4 Click License Management 5 21 ...
Page 822: ...Click Disable 6 Click Yes The license file is disabled 22 ...
Page 824: ...4 Click License Management 5 24 ...
Page 827: ...4 Click License Management 5 27 ...
Page 828: ...Click Delete 6 Click Yes The license file is deleted 28 ...
Page 830: ...4 Click Authentication Information Settings 5 30 ...
Page 832: ...When cancelling authentication information Click Delete 32 ...
Page 837: ...5 ...
Page 846: ...14 ...
Page 849: ...17 ...
Page 855: ...4 Click Yes The setting information of the application is deleted 23 ...