components/nmap/nmap.license
changeset 1091 ce8b381f34b6
parent 1029 6fa22a458187
child 1205 6c6c27bcf9ac
equal deleted inserted replaced
1090:8762487c5db0 1091:ce8b381f34b6
     1 ---------------------
     1 --------------
     2 - NMAP v5.51  -
     2 - nmap v6.25 -
     3 ---------------------
     3 --------------
     4 
     4 
     5 Oracle Internal Tracking Number 9217
     5 Oracle Internal Tracking Number 9217
     6 -----------------------------------------------------------------------
     6 
     7 
     7 /***************************************************************************
     8 /****************************************************************************
     8  * COPYING -- Describes the terms under which Nmap is distributed.  A copy *
     9  * The Nmap Security Scanner is (C) 1996-2009 Insecure.Com LLC. Nmap is    *
     9  * of the GNU GPL is appended to this file.                                *
       
    10  *                                                                         *
       
    11  ***********************IMPORTANT NMAP LICENSE TERMS************************
       
    12  *                                                                         *
       
    13  * The Nmap Security Scanner is (C) 1996-2012 Insecure.Com LLC. Nmap is    *
    10  * also a registered trademark of Insecure.Com LLC.  This program is free  *
    14  * also a registered trademark of Insecure.Com LLC.  This program is free  *
    11  * software; you may redistribute and/or modify it under the terms of the  *
    15  * software; you may redistribute and/or modify it under the terms of the  *
    12  * GNU General Public License as published by the Free Software            *
    16  * GNU General Public License as published by the Free Software            *
    13  * Foundation; Version 2 with the clarifications and exceptions described  *
    17  * Foundation; Version 2 with the clarifications and exceptions described  *
    14  * below.  This guarantees your right to use, modify, and redistribute     *
    18  * below.  This guarantees your right to use, modify, and redistribute     *
    15  * this software under certain conditions.  If you wish to embed Nmap      *
    19  * this software under certain conditions.  If you wish to embed Nmap      *
    16  * technology into proprietary software, we sell alternative licenses      *
    20  * technology into proprietary software, we sell alternative licenses      *
    17  * (contact [email protected]).  Dozens of software vendors already       *
    21  * (contact [email protected]).  Dozens of software vendors already       *
    18  * license Nmap technology such as host discovery, port scanning, OS       *
    22  * license Nmap technology such as host discovery, port scanning, OS       *
    19  * detection, and version detection.                                       *
    23  * detection, version detection, and the Nmap Scripting Engine.            *
    20  *                                                                         *
    24  *                                                                         *
    21  * Note that the GPL places important restrictions on "derived works", yet *
    25  * Note that the GPL places important restrictions on "derived works", yet *
    22  * it does not provide a detailed definition of that term.  To avoid       *
    26  * it does not provide a detailed definition of that term.  To avoid       *
    23  * misunderstandings, we consider an application to constitute a           *
    27  * misunderstandings, we interpret that term as broadly as copyright law   *
       
    28  * allows.  For example, we consider an application to constitute a        *
    24  * "derivative work" for the purpose of this license if it does any of the *
    29  * "derivative work" for the purpose of this license if it does any of the *
    25  * following:                                                              *
    30  * following:                                                              *
    26  * o Integrates source code from Nmap                                      *
    31  * o Integrates source code from Nmap                                      *
    27  * o Reads or includes Nmap copyrighted data files, such as                *
    32  * o Reads or includes Nmap copyrighted data files, such as                *
    28  *   nmap-os-db or nmap-service-probes.                                    *
    33  *   nmap-os-db or nmap-service-probes.                                    *
    29  * o Executes Nmap and parses the results (as opposed to typical shell or  *
    34  * o Executes Nmap and parses the results (as opposed to typical shell or  *
    30  *   execution-menu apps, which simply display raw Nmap output and so are  *
    35  *   execution-menu apps, which simply display raw Nmap output and so are  *
    31  *   not derivative works.)                                                * 
    36  *   not derivative works.)                                                *
    32  * o Integrates/includes/aggregates Nmap into a proprietary executable     *
    37  * o Integrates/includes/aggregates Nmap into a proprietary executable     *
    33  *   installer, such as those produced by InstallShield.                   *
    38  *   installer, such as those produced by InstallShield.                   *
    34  * o Links to a library or executes a program that does any of the above   *
    39  * o Links to a library or executes a program that does any of the above   *
    35  *                                                                         *
    40  *                                                                         *
    36  * The term "Nmap" should be taken to also include any portions or derived *
    41  * The term "Nmap" should be taken to also include any portions or derived *
    37  * works of Nmap.  This list is not exclusive, but is meant to clarify our *
    42  * works of Nmap, as well as other software we distribute under this       *
    38  * interpretation of derived works with some common examples.  Our         *
    43  * license such as Zenmap, Ncat, and Nping.  This list is not exclusive,   *
    39  * interpretation applies only to Nmap--we don't speak for other people's  *
    44  * but is meant to clarify our interpretation of derived works with some   *
    40  * GPL works.                                                              *
    45  * common examples.  Our interpretation applies only to Nmap--we don't     *
       
    46  * speak for other people's GPL works.                                     *
    41  *                                                                         *
    47  *                                                                         *
    42  * If you have any questions about the GPL licensing restrictions on using *
    48  * If you have any questions about the GPL licensing restrictions on using *
    43  * Nmap in non-GPL works, we would be happy to help.  As mentioned above,  *
    49  * Nmap in non-GPL works, we would be happy to help.  As mentioned above,  *
    44  * we also offer alternative license to integrate Nmap into proprietary    *
    50  * we also offer alternative license to integrate Nmap into proprietary    *
    45  * applications and appliances.  These contracts have been sold to dozens  *
    51  * applications and appliances.  These contracts have been sold to dozens  *
    46  * of software vendors, and generally include a perpetual license as well  *
    52  * of software vendors, and generally include a perpetual license as well  *
    47  * as providing for priority support and updates as well as helping to     *
    53  * as providing for priority support and updates.  They also fund the      *
    48  * fund the continued development of Nmap technology.  Please email        *
    54  * continued development of Nmap.  Please email [email protected] for     *
    49  * [email protected] for further information.                             *
    55  * further information.                                                    *
    50  *                                                                         *
    56  *                                                                         *
    51  * As a special exception to the GPL terms, Insecure.Com LLC grants        *
    57  * As a special exception to the GPL terms, Insecure.Com LLC grants        *
    52  * permission to link the code of this program with any version of the     *
    58  * permission to link the code of this program with any version of the     *
    53  * OpenSSL library which is distributed under a license identical to that  *
    59  * OpenSSL library which is distributed under a license identical to that  *
    54  * listed in the included COPYING.OpenSSL file, and distribute linked      *
    60  * listed in the included docs/licenses/OpenSSL.txt file, and distribute   *
    55  * combinations including the two. You must obey the GNU GPL in all        *
    61  * linked combinations including the two. You must obey the GNU GPL in all *
    56  * respects for all of the code used other than OpenSSL.  If you modify    *
    62  * respects for all of the code used other than OpenSSL.  If you modify    *
    57  * this file, you may extend this exception to your version of the file,   *
    63  * this file, you may extend this exception to your version of the file,   *
    58  * but you are not obligated to do so.                                     *
    64  * but you are not obligated to do so.                                     *
    59  *                                                                         *
    65  *                                                                         *
    60  * If you received these files with a written license agreement or         *
    66  * If you received these files with a written license agreement or         *
    68  *                                                                         *
    74  *                                                                         *
    69  * Source code also allows you to port Nmap to new platforms, fix bugs,    *
    75  * Source code also allows you to port Nmap to new platforms, fix bugs,    *
    70  * and add new features.  You are highly encouraged to send your changes   *
    76  * and add new features.  You are highly encouraged to send your changes   *
    71  * to [email protected] for possible incorporation into the main       *
    77  * to [email protected] for possible incorporation into the main       *
    72  * distribution.  By sending these changes to Fyodor or one of the         *
    78  * distribution.  By sending these changes to Fyodor or one of the         *
    73  * Insecure.Org development mailing lists, it is assumed that you are      *
    79  * Insecure.Org development mailing lists, or checking them into the Nmap  *
    74  * offering the Nmap Project (Insecure.Com LLC) the unlimited,             *
    80  * source code repository, it is understood (unless you specify otherwise) *
    75  * non-exclusive right to reuse, modify, and relicense the code.  Nmap     *
    81  * that you are offering the Nmap Project (Insecure.Com LLC) the           *
    76  * will always be available Open Source, but this is important because the *
    82  * unlimited, non-exclusive right to reuse, modify, and relicense the      *
    77  * inability to relicense code has caused devastating problems for other   *
    83  * code.  Nmap will always be available Open Source, but this is important *
    78  * Free Software projects (such as KDE and NASM).  We also occasionally    *
    84  * because the inability to relicense code has caused devastating problems *
    79  * relicense the code to third parties as discussed above.  If you wish to *
    85  * for other Free Software projects (such as KDE and NASM).  We also       *
    80  * specify special license conditions of your contributions, just say so   *
    86  * occasionally relicense the code to third parties as discussed above.    *
    81  * when you send them.                                                     *
    87  * If you wish to specify special license conditions of your               *
       
    88  * contributions, just say so when you send them.                          *
    82  *                                                                         *
    89  *                                                                         *
    83  * This program is distributed in the hope that it will be useful, but     *
    90  * This program is distributed in the hope that it will be useful, but     *
    84  * WITHOUT ANY WARRANTY; without even the implied warranty of              *
    91  * WITHOUT ANY WARRANTY; without even the implied warranty of              *
    85  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU       *
    92  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU       *
    86  * General Public License v2.0 for more details at                         *
    93  * General Public License v2.0 for more details at                         *
   558  * 
   565  * 
   559  * The licence and distribution terms for any publically available version or
   566  * The licence and distribution terms for any publically available version or
   560  * derivative of this code cannot be changed.  i.e. this code cannot simply be
   567  * derivative of this code cannot be changed.  i.e. this code cannot simply be
   561  * copied and put under another distribution licence
   568  * copied and put under another distribution licence
   562  * [including the GNU Public Licence.]
   569  * [including the GNU Public Licence.]
   563