1 --------------------- |
1 -------------- |
2 - NMAP v5.51 - |
2 - nmap v6.25 - |
3 --------------------- |
3 -------------- |
4 |
4 |
5 Oracle Internal Tracking Number 9217 |
5 Oracle Internal Tracking Number 9217 |
6 ----------------------------------------------------------------------- |
6 |
7 |
7 /*************************************************************************** |
8 /**************************************************************************** |
8 * COPYING -- Describes the terms under which Nmap is distributed. A copy * |
9 * The Nmap Security Scanner is (C) 1996-2009 Insecure.Com LLC. Nmap is * |
9 * of the GNU GPL is appended to this file. * |
|
10 * * |
|
11 ***********************IMPORTANT NMAP LICENSE TERMS************************ |
|
12 * * |
|
13 * The Nmap Security Scanner is (C) 1996-2012 Insecure.Com LLC. Nmap is * |
10 * also a registered trademark of Insecure.Com LLC. This program is free * |
14 * also a registered trademark of Insecure.Com LLC. This program is free * |
11 * software; you may redistribute and/or modify it under the terms of the * |
15 * software; you may redistribute and/or modify it under the terms of the * |
12 * GNU General Public License as published by the Free Software * |
16 * GNU General Public License as published by the Free Software * |
13 * Foundation; Version 2 with the clarifications and exceptions described * |
17 * Foundation; Version 2 with the clarifications and exceptions described * |
14 * below. This guarantees your right to use, modify, and redistribute * |
18 * below. This guarantees your right to use, modify, and redistribute * |
15 * this software under certain conditions. If you wish to embed Nmap * |
19 * this software under certain conditions. If you wish to embed Nmap * |
16 * technology into proprietary software, we sell alternative licenses * |
20 * technology into proprietary software, we sell alternative licenses * |
17 * (contact [email protected]). Dozens of software vendors already * |
21 * (contact [email protected]). Dozens of software vendors already * |
18 * license Nmap technology such as host discovery, port scanning, OS * |
22 * license Nmap technology such as host discovery, port scanning, OS * |
19 * detection, and version detection. * |
23 * detection, version detection, and the Nmap Scripting Engine. * |
20 * * |
24 * * |
21 * Note that the GPL places important restrictions on "derived works", yet * |
25 * Note that the GPL places important restrictions on "derived works", yet * |
22 * it does not provide a detailed definition of that term. To avoid * |
26 * it does not provide a detailed definition of that term. To avoid * |
23 * misunderstandings, we consider an application to constitute a * |
27 * misunderstandings, we interpret that term as broadly as copyright law * |
|
28 * allows. For example, we consider an application to constitute a * |
24 * "derivative work" for the purpose of this license if it does any of the * |
29 * "derivative work" for the purpose of this license if it does any of the * |
25 * following: * |
30 * following: * |
26 * o Integrates source code from Nmap * |
31 * o Integrates source code from Nmap * |
27 * o Reads or includes Nmap copyrighted data files, such as * |
32 * o Reads or includes Nmap copyrighted data files, such as * |
28 * nmap-os-db or nmap-service-probes. * |
33 * nmap-os-db or nmap-service-probes. * |
29 * o Executes Nmap and parses the results (as opposed to typical shell or * |
34 * o Executes Nmap and parses the results (as opposed to typical shell or * |
30 * execution-menu apps, which simply display raw Nmap output and so are * |
35 * execution-menu apps, which simply display raw Nmap output and so are * |
31 * not derivative works.) * |
36 * not derivative works.) * |
32 * o Integrates/includes/aggregates Nmap into a proprietary executable * |
37 * o Integrates/includes/aggregates Nmap into a proprietary executable * |
33 * installer, such as those produced by InstallShield. * |
38 * installer, such as those produced by InstallShield. * |
34 * o Links to a library or executes a program that does any of the above * |
39 * o Links to a library or executes a program that does any of the above * |
35 * * |
40 * * |
36 * The term "Nmap" should be taken to also include any portions or derived * |
41 * The term "Nmap" should be taken to also include any portions or derived * |
37 * works of Nmap. This list is not exclusive, but is meant to clarify our * |
42 * works of Nmap, as well as other software we distribute under this * |
38 * interpretation of derived works with some common examples. Our * |
43 * license such as Zenmap, Ncat, and Nping. This list is not exclusive, * |
39 * interpretation applies only to Nmap--we don't speak for other people's * |
44 * but is meant to clarify our interpretation of derived works with some * |
40 * GPL works. * |
45 * common examples. Our interpretation applies only to Nmap--we don't * |
|
46 * speak for other people's GPL works. * |
41 * * |
47 * * |
42 * If you have any questions about the GPL licensing restrictions on using * |
48 * If you have any questions about the GPL licensing restrictions on using * |
43 * Nmap in non-GPL works, we would be happy to help. As mentioned above, * |
49 * Nmap in non-GPL works, we would be happy to help. As mentioned above, * |
44 * we also offer alternative license to integrate Nmap into proprietary * |
50 * we also offer alternative license to integrate Nmap into proprietary * |
45 * applications and appliances. These contracts have been sold to dozens * |
51 * applications and appliances. These contracts have been sold to dozens * |
46 * of software vendors, and generally include a perpetual license as well * |
52 * of software vendors, and generally include a perpetual license as well * |
47 * as providing for priority support and updates as well as helping to * |
53 * as providing for priority support and updates. They also fund the * |
48 * fund the continued development of Nmap technology. Please email * |
54 * continued development of Nmap. Please email [email protected] for * |
49 * [email protected] for further information. * |
55 * further information. * |
50 * * |
56 * * |
51 * As a special exception to the GPL terms, Insecure.Com LLC grants * |
57 * As a special exception to the GPL terms, Insecure.Com LLC grants * |
52 * permission to link the code of this program with any version of the * |
58 * permission to link the code of this program with any version of the * |
53 * OpenSSL library which is distributed under a license identical to that * |
59 * OpenSSL library which is distributed under a license identical to that * |
54 * listed in the included COPYING.OpenSSL file, and distribute linked * |
60 * listed in the included docs/licenses/OpenSSL.txt file, and distribute * |
55 * combinations including the two. You must obey the GNU GPL in all * |
61 * linked combinations including the two. You must obey the GNU GPL in all * |
56 * respects for all of the code used other than OpenSSL. If you modify * |
62 * respects for all of the code used other than OpenSSL. If you modify * |
57 * this file, you may extend this exception to your version of the file, * |
63 * this file, you may extend this exception to your version of the file, * |
58 * but you are not obligated to do so. * |
64 * but you are not obligated to do so. * |
59 * * |
65 * * |
60 * If you received these files with a written license agreement or * |
66 * If you received these files with a written license agreement or * |
68 * * |
74 * * |
69 * Source code also allows you to port Nmap to new platforms, fix bugs, * |
75 * Source code also allows you to port Nmap to new platforms, fix bugs, * |
70 * and add new features. You are highly encouraged to send your changes * |
76 * and add new features. You are highly encouraged to send your changes * |
71 * to [email protected] for possible incorporation into the main * |
77 * to [email protected] for possible incorporation into the main * |
72 * distribution. By sending these changes to Fyodor or one of the * |
78 * distribution. By sending these changes to Fyodor or one of the * |
73 * Insecure.Org development mailing lists, it is assumed that you are * |
79 * Insecure.Org development mailing lists, or checking them into the Nmap * |
74 * offering the Nmap Project (Insecure.Com LLC) the unlimited, * |
80 * source code repository, it is understood (unless you specify otherwise) * |
75 * non-exclusive right to reuse, modify, and relicense the code. Nmap * |
81 * that you are offering the Nmap Project (Insecure.Com LLC) the * |
76 * will always be available Open Source, but this is important because the * |
82 * unlimited, non-exclusive right to reuse, modify, and relicense the * |
77 * inability to relicense code has caused devastating problems for other * |
83 * code. Nmap will always be available Open Source, but this is important * |
78 * Free Software projects (such as KDE and NASM). We also occasionally * |
84 * because the inability to relicense code has caused devastating problems * |
79 * relicense the code to third parties as discussed above. If you wish to * |
85 * for other Free Software projects (such as KDE and NASM). We also * |
80 * specify special license conditions of your contributions, just say so * |
86 * occasionally relicense the code to third parties as discussed above. * |
81 * when you send them. * |
87 * If you wish to specify special license conditions of your * |
|
88 * contributions, just say so when you send them. * |
82 * * |
89 * * |
83 * This program is distributed in the hope that it will be useful, but * |
90 * This program is distributed in the hope that it will be useful, but * |
84 * WITHOUT ANY WARRANTY; without even the implied warranty of * |
91 * WITHOUT ANY WARRANTY; without even the implied warranty of * |
85 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * |
92 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * |
86 * General Public License v2.0 for more details at * |
93 * General Public License v2.0 for more details at * |