|
1 ---------------------------------------------------------------------- |
|
2 "NetHack, Copyright 1985-2003" |
|
3 Copyright 1991 University of Wisconsin-Madison |
|
4 Copyright (c) 1983 Regents of the University of California. |
|
5 Copyright (C) 1987-1990 by Ken Arromdee |
|
6 Copyright (C) 1992-2000 Trolltech AS. All rights reserved. |
|
7 Copyright (C) 1991,1993,1995 by Robert Patrick Rankin |
|
8 Copyright (C) 1998 by Anthony Taylor <[email protected]> |
|
9 Copyright (C) 1998 by Erik Andersen <[email protected]> |
|
10 Copyright (C) 2001-2003 by Alex Kompel <[email protected]> |
|
11 Copyright (C) 2002 by Dylan Alex Simon |
|
12 Copyright (c) 1988-1989 AT&T |
|
13 Copyright (c) 1989,1992 Janet Walz |
|
14 Copyright (c) 1989 Mike Threepoint |
|
15 Copyright (c) 1989-1996 by Jean-Christophe Collet |
|
16 Copyright (c) 1986-1995 by M. Stephenson |
|
17 Copyright (c) 1989y Norm Meluch and Stephen Spackman |
|
18 Copyright (c) 1991-1993 P. Winner |
|
19 Copyright (c) 1990-1993 by David Cohrs |
|
20 Copyright (c) 1989,1991-1993 Izchak Miller |
|
21 Copyright (c) 1992 by Jon Watte |
|
22 Copyright (c) 1991-1996 Gregg Wonderly, Naperville Illinois |
|
23 Copyright (c) 1994 by Boudewijn Wayers |
|
24 Copyright (c) 1994-1996 Andrew Church, Olney, Maryland |
|
25 Copyright (c) 1990-1996,2002 by Dean Luick |
|
26 Copyright (c) 1991 Michael Hamel |
|
27 Copyright (c) 1998-1999,2002 by Kevin Hugo |
|
28 Copyright (c) 2002 Mark Modrall |
|
29 Copyright (c) 1989 Benson I. Margulies |
|
30 Copyright (c) 1989 Steve Linhart |
|
31 Copyright (c) 1989 Eric Raymond |
|
32 Copyright (c) 1999-2002 Christian Bressler |
|
33 Copyright (c) 1993 David Hairston |
|
34 Copyright (c) 2000 Janne Salmij??rv |
|
35 Copyright (c) 1992 Hao-Yang Wang, Jonathan Handler |
|
36 Copyright (c) 1990-1996 Kenneth Lorber |
|
37 Copyright (c) 1992-1993 Jon W{tte 1993. |
|
38 Copyright (c) 1997 Michael Allison |
|
39 Copyright (c) 1990-2003 NetHack PC Development Team 1990-2003 |
|
40 Copyright (c) 1993 Macintosh NetHack Port Team |
|
41 Copyright (c) 1992-1999 the NetHack Development Team |
|
42 Copyright (c) 1988-1992 Olaf Seibert |
|
43 Copyright (c) 2001 Slash'EM development team |
|
44 Copyright (c) 1988 Steve Creps |
|
45 Copyright (c) 1985-2003 Stichting Mathematisch Centrum, Amsterdam |
|
46 Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993, 1996. |
|
47 Copyright (c) 1999-2002 Yitzhak Sapir |
|
48 Copyright (c) 1996-2001 Warwick Allison |
|
49 Copyright (c) 1986 Scott R. Turner, srt@ucla |
|
50 Copyright (c) 1990 David Koblas |
|
51 COPYRIGHT "Copyright 1989-1991 Network Computing Devices, Inc." |
|
52 with acknowledgements to Kevin Darcy |
|
53 ---------------------------------------------------------------------- |
|
54 NETHACK GENERAL PUBLIC LICENSE |
|
55 (Copyright 1989 M. Stephenson) |
|
56 |
|
57 (Based on the BISON general public license, |
|
58 copyright 1988 Richard M. Stallman) |
|
59 |
|
60 Everyone is permitted to copy and distribute verbatim copies of this |
|
61 license, but changing it is not allowed. You can also use this wording to |
|
62 make the terms for other programs. |
|
63 |
|
64 The license agreements of most software companies keep you at the mercy of |
|
65 those companies. By contrast, our general public license is intended to give |
|
66 everyone the right to share NetHack. To make sure that you get the rights we |
|
67 want you to have, we need to make restrictions that forbid anyone to deny you |
|
68 these rights or to ask you to surrender the rights. Hence this license |
|
69 agreement. |
|
70 |
|
71 Specifically, we want to make sure that you have the right to give away |
|
72 copies of NetHack, that you receive source code or else can get it if you |
|
73 want it, that you can change NetHack or use pieces of it in new free |
|
74 programs, and that you know you can do these things. |
|
75 |
|
76 To make sure that everyone has such rights, we have to forbid you to |
|
77 deprive anyone else of these rights. For example, if you distribute copies |
|
78 of NetHack, you must give the recipients all the rights that you have. You |
|
79 must make sure that they, too, receive or can get the source code. And you |
|
80 must tell them their rights. |
|
81 |
|
82 Also, for our own protection, we must make certain that everyone finds out |
|
83 that there is no warranty for NetHack. If NetHack is modified by someone |
|
84 else and passed on, we want its recipients to know that what they have is |
|
85 not what we distributed. |
|
86 |
|
87 Therefore we (Mike Stephenson and other holders of NetHack copyrights) make |
|
88 the following terms which say what you must do to be allowed to distribute or |
|
89 change NetHack. |
|
90 |
|
91 |
|
92 COPYING POLICIES |
|
93 |
|
94 1. You may copy and distribute verbatim copies of NetHack source code as |
|
95 you receive it, in any medium, provided that you keep intact the notices on |
|
96 all files that refer to copyrights, to this License Agreement, and to the |
|
97 absence of any warranty; and give any other recipients of the NetHack |
|
98 program a copy of this License Agreement along with the program. |
|
99 |
|
100 2. You may modify your copy or copies of NetHack or any portion of it, and |
|
101 copy and distribute such modifications under the terms of Paragraph 1 above |
|
102 (including distributing this License Agreement), provided that you also do the |
|
103 following: |
|
104 |
|
105 a) cause the modified files to carry prominent notices stating that you |
|
106 changed the files and the date of any change; and |
|
107 |
|
108 b) cause the whole of any work that you distribute or publish, that in |
|
109 whole or in part contains or is a derivative of NetHack or any part |
|
110 thereof, to be licensed at no charge to all third parties on terms |
|
111 identical to those contained in this License Agreement (except that you |
|
112 may choose to grant more extensive warranty protection to some or all |
|
113 third parties, at your option) |
|
114 |
|
115 c) You may charge a distribution fee for the physical act of |
|
116 transferring a copy, and you may at your option offer warranty protection |
|
117 in exchange for a fee. |
|
118 |
|
119 3. You may copy and distribute NetHack (or a portion or derivative of it, |
|
120 under Paragraph 2) in object code or executable form under the terms of |
|
121 Paragraphs 1 and 2 above provided that you also do one of the following: |
|
122 |
|
123 a) accompany it with the complete machine-readable source code, which |
|
124 must be distributed under the terms of Paragraphs 1 and 2 above; or, |
|
125 |
|
126 b) accompany it with full information as to how to obtain the complete |
|
127 machine-readable source code from an appropriate archive site. (This |
|
128 alternative is allowed only for noncommercial distribution.) |
|
129 |
|
130 For these purposes, complete source code means either the full source |
|
131 distribution as originally released over Usenet or updated copies of the |
|
132 files in this distribution used to create the object code or executable. |
|
133 |
|
134 4. You may not copy, sublicense, distribute or transfer NetHack except as |
|
135 expressly provided under this License Agreement. Any attempt otherwise to |
|
136 copy, sublicense, distribute or transfer NetHack is void and your rights to |
|
137 use the program under this License agreement shall be automatically |
|
138 terminated. However, parties who have received computer software programs |
|
139 from you with this License Agreement will not have their licenses terminated |
|
140 so long as such parties remain in full compliance. |
|
141 |
|
142 |
|
143 Stated plainly: You are permitted to modify NetHack, or otherwise use parts |
|
144 of NetHack, provided that you comply with the conditions specified above; |
|
145 in particular, your modified NetHack or program containing parts of NetHack |
|
146 must remain freely available as provided in this License Agreement. In |
|
147 other words, go ahead and share NetHack, but don't try to stop anyone else |
|
148 from sharing it farther. |
|
149 |
|
150 Copyright (c) 2011, Oracle and/or its affiliates. All rights reserved. |