components/nethack/nethack.copyright
changeset 301 ab9eef4f4029
equal deleted inserted replaced
300:6bbccb36ba62 301:ab9eef4f4029
       
     1 ----------------------------------------------------------------------
       
     2 "NetHack, Copyright 1985-2003"
       
     3 Copyright 1991 University of Wisconsin-Madison
       
     4 Copyright (c) 1983 Regents of the University of California.
       
     5 Copyright (C) 1987-1990 by Ken Arromdee
       
     6 Copyright (C) 1992-2000 Trolltech AS.  All rights reserved.
       
     7 Copyright (C) 1991,1993,1995 by Robert Patrick Rankin
       
     8 Copyright (C) 1998 by Anthony Taylor <[email protected]>
       
     9 Copyright (C) 1998 by Erik Andersen <[email protected]>
       
    10 Copyright (C) 2001-2003 by Alex Kompel <[email protected]>
       
    11 Copyright (C) 2002 by Dylan Alex Simon
       
    12 Copyright (c) 1988-1989 AT&T
       
    13 Copyright (c) 1989,1992 Janet Walz
       
    14 Copyright (c) 1989 Mike Threepoint
       
    15 Copyright (c) 1989-1996 by Jean-Christophe Collet
       
    16 Copyright (c) 1986-1995 by M. Stephenson
       
    17 Copyright (c) 1989y Norm Meluch and Stephen Spackman
       
    18 Copyright (c) 1991-1993 P. Winner
       
    19 Copyright (c) 1990-1993 by David Cohrs
       
    20 Copyright (c) 1989,1991-1993 Izchak Miller
       
    21 Copyright (c) 1992 by Jon Watte
       
    22 Copyright (c) 1991-1996 Gregg Wonderly, Naperville Illinois
       
    23 Copyright (c) 1994 by Boudewijn Wayers
       
    24 Copyright (c) 1994-1996 Andrew Church, Olney, Maryland
       
    25 Copyright (c) 1990-1996,2002 by Dean Luick
       
    26 Copyright (c) 1991 Michael Hamel
       
    27 Copyright (c) 1998-1999,2002 by Kevin Hugo
       
    28 Copyright (c) 2002 Mark Modrall
       
    29 Copyright (c) 1989 Benson I. Margulies
       
    30 Copyright (c) 1989 Steve Linhart
       
    31 Copyright (c) 1989 Eric Raymond
       
    32 Copyright (c) 1999-2002 Christian Bressler
       
    33 Copyright (c) 1993 David Hairston
       
    34 Copyright (c) 2000 Janne Salmij??rv
       
    35 Copyright (c) 1992 Hao-Yang Wang, Jonathan Handler
       
    36 Copyright (c) 1990-1996 Kenneth Lorber
       
    37 Copyright (c) 1992-1993 Jon W{tte 1993.
       
    38 Copyright (c) 1997 Michael Allison
       
    39 Copyright (c) 1990-2003 NetHack PC Development Team 1990-2003
       
    40 Copyright (c) 1993 Macintosh NetHack Port Team
       
    41 Copyright (c) 1992-1999 the NetHack Development Team
       
    42 Copyright (c) 1988-1992 Olaf Seibert
       
    43 Copyright (c) 2001 Slash'EM development team
       
    44 Copyright (c) 1988 Steve Creps
       
    45 Copyright (c) 1985-2003 Stichting Mathematisch Centrum, Amsterdam
       
    46 Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993, 1996.
       
    47 Copyright (c) 1999-2002 Yitzhak Sapir
       
    48 Copyright (c) 1996-2001 Warwick Allison
       
    49 Copyright (c) 1986 Scott R. Turner, srt@ucla
       
    50 Copyright (c) 1990 David Koblas
       
    51 COPYRIGHT "Copyright 1989-1991 Network Computing Devices, Inc."
       
    52 with acknowledgements to Kevin Darcy
       
    53 ----------------------------------------------------------------------
       
    54                     NETHACK GENERAL PUBLIC LICENSE
       
    55                     (Copyright 1989 M. Stephenson)
       
    56 
       
    57                (Based on the BISON general public license,
       
    58                    copyright 1988 Richard M. Stallman)
       
    59 
       
    60  Everyone is permitted to copy and distribute verbatim copies of this
       
    61  license, but changing it is not allowed.  You can also use this wording to
       
    62  make the terms for other programs.
       
    63 
       
    64   The license agreements of most software companies keep you at the mercy of
       
    65 those companies.  By contrast, our general public license is intended to give
       
    66 everyone the right to share NetHack.  To make sure that you get the rights we
       
    67 want you to have, we need to make restrictions that forbid anyone to deny you
       
    68 these rights or to ask you to surrender the rights.  Hence this license
       
    69 agreement.
       
    70 
       
    71   Specifically, we want to make sure that you have the right to give away
       
    72 copies of NetHack, that you receive source code or else can get it if you
       
    73 want it, that you can change NetHack or use pieces of it in new free
       
    74 programs, and that you know you can do these things.
       
    75 
       
    76   To make sure that everyone has such rights, we have to forbid you to
       
    77 deprive anyone else of these rights.  For example, if you distribute copies
       
    78 of NetHack, you must give the recipients all the rights that you have.  You
       
    79 must make sure that they, too, receive or can get the source code.  And you
       
    80 must tell them their rights.
       
    81 
       
    82   Also, for our own protection, we must make certain that everyone finds out
       
    83 that there is no warranty for NetHack.  If NetHack is modified by someone
       
    84 else and passed on, we want its recipients to know that what they have is
       
    85 not what we distributed.
       
    86 
       
    87   Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
       
    88 the following terms which say what you must do to be allowed to distribute or
       
    89 change NetHack.
       
    90 
       
    91 
       
    92                         COPYING POLICIES
       
    93 
       
    94   1. You may copy and distribute verbatim copies of NetHack source code as
       
    95 you receive it, in any medium, provided that you keep intact the notices on
       
    96 all files that refer to copyrights, to this License Agreement, and to the
       
    97 absence of any warranty; and give any other recipients of the NetHack
       
    98 program a copy of this License Agreement along with the program.
       
    99 
       
   100   2. You may modify your copy or copies of NetHack or any portion of it, and
       
   101 copy and distribute such modifications under the terms of Paragraph 1 above
       
   102 (including distributing this License Agreement), provided that you also do the
       
   103 following:
       
   104 
       
   105     a) cause the modified files to carry prominent notices stating that you
       
   106     changed the files and the date of any change; and
       
   107 
       
   108     b) cause the whole of any work that you distribute or publish, that in
       
   109     whole or in part contains or is a derivative of NetHack or any part
       
   110     thereof, to be licensed at no charge to all third parties on terms
       
   111     identical to those contained in this License Agreement (except that you
       
   112     may choose to grant more extensive warranty protection to some or all
       
   113     third parties, at your option)
       
   114 
       
   115     c) You may charge a distribution fee for the physical act of
       
   116     transferring a copy, and you may at your option offer warranty protection
       
   117     in exchange for a fee.
       
   118 
       
   119   3. You may copy and distribute NetHack (or a portion or derivative of it,
       
   120 under Paragraph 2) in object code or executable form under the terms of
       
   121 Paragraphs 1 and 2 above provided that you also do one of the following:
       
   122 
       
   123     a) accompany it with the complete machine-readable source code, which
       
   124     must be distributed under the terms of Paragraphs 1 and 2 above; or,
       
   125 
       
   126     b) accompany it with full information as to how to obtain the complete
       
   127     machine-readable source code from an appropriate archive site.  (This
       
   128     alternative is allowed only for noncommercial distribution.)
       
   129 
       
   130 For these purposes, complete source code means either the full source
       
   131 distribution as originally released over Usenet or updated copies of the
       
   132 files in this distribution used to create the object code or executable.
       
   133 
       
   134   4. You may not copy, sublicense, distribute or transfer NetHack except as
       
   135 expressly provided under this License Agreement.  Any attempt otherwise to
       
   136 copy, sublicense, distribute or transfer NetHack is void and your rights to
       
   137 use the program under this License agreement shall be automatically
       
   138 terminated.  However, parties who have received computer software programs
       
   139 from you with this License Agreement will not have their licenses terminated
       
   140 so long as such parties remain in full compliance.
       
   141 
       
   142 
       
   143 Stated plainly:  You are permitted to modify NetHack, or otherwise use parts
       
   144 of NetHack, provided that you comply with the conditions specified above;
       
   145 in particular, your modified NetHack or program containing parts of NetHack
       
   146 must remain freely available as provided in this License Agreement.  In
       
   147 other words, go ahead and share NetHack, but don't try to stop anyone else
       
   148 from sharing it farther.
       
   149 
       
   150 Copyright (c) 2011, Oracle and/or its affiliates. All rights reserved.