components/nethack/nethack.copyright
author Jan Noha <jan.noha@oracle.com>
Thu, 24 Apr 2014 17:36:25 +0200
branchs11u2-sru
changeset 3388 68cefdb716e2
parent 301 ab9eef4f4029
permissions -rw-r--r--
18385582 compress/gzip package bringing in extra dependancies with fix for 15440739

----------------------------------------------------------------------
"NetHack, Copyright 1985-2003"
Copyright 1991 University of Wisconsin-Madison
Copyright (c) 1983 Regents of the University of California.
Copyright (C) 1987-1990 by Ken Arromdee
Copyright (C) 1992-2000 Trolltech AS.  All rights reserved.
Copyright (C) 1991,1993,1995 by Robert Patrick Rankin
Copyright (C) 1998 by Anthony Taylor <[email protected]>
Copyright (C) 1998 by Erik Andersen <[email protected]>
Copyright (C) 2001-2003 by Alex Kompel <[email protected]>
Copyright (C) 2002 by Dylan Alex Simon
Copyright (c) 1988-1989 AT&T
Copyright (c) 1989,1992 Janet Walz
Copyright (c) 1989 Mike Threepoint
Copyright (c) 1989-1996 by Jean-Christophe Collet
Copyright (c) 1986-1995 by M. Stephenson
Copyright (c) 1989y Norm Meluch and Stephen Spackman
Copyright (c) 1991-1993 P. Winner
Copyright (c) 1990-1993 by David Cohrs
Copyright (c) 1989,1991-1993 Izchak Miller
Copyright (c) 1992 by Jon Watte
Copyright (c) 1991-1996 Gregg Wonderly, Naperville Illinois
Copyright (c) 1994 by Boudewijn Wayers
Copyright (c) 1994-1996 Andrew Church, Olney, Maryland
Copyright (c) 1990-1996,2002 by Dean Luick
Copyright (c) 1991 Michael Hamel
Copyright (c) 1998-1999,2002 by Kevin Hugo
Copyright (c) 2002 Mark Modrall
Copyright (c) 1989 Benson I. Margulies
Copyright (c) 1989 Steve Linhart
Copyright (c) 1989 Eric Raymond
Copyright (c) 1999-2002 Christian Bressler
Copyright (c) 1993 David Hairston
Copyright (c) 2000 Janne Salmij??rv
Copyright (c) 1992 Hao-Yang Wang, Jonathan Handler
Copyright (c) 1990-1996 Kenneth Lorber
Copyright (c) 1992-1993 Jon W{tte 1993.
Copyright (c) 1997 Michael Allison
Copyright (c) 1990-2003 NetHack PC Development Team 1990-2003
Copyright (c) 1993 Macintosh NetHack Port Team
Copyright (c) 1992-1999 the NetHack Development Team
Copyright (c) 1988-1992 Olaf Seibert
Copyright (c) 2001 Slash'EM development team
Copyright (c) 1988 Steve Creps
Copyright (c) 1985-2003 Stichting Mathematisch Centrum, Amsterdam
Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993, 1996.
Copyright (c) 1999-2002 Yitzhak Sapir
Copyright (c) 1996-2001 Warwick Allison
Copyright (c) 1986 Scott R. Turner, srt@ucla
Copyright (c) 1990 David Koblas
COPYRIGHT "Copyright 1989-1991 Network Computing Devices, Inc."
with acknowledgements to Kevin Darcy
----------------------------------------------------------------------
                    NETHACK GENERAL PUBLIC LICENSE
                    (Copyright 1989 M. Stephenson)

               (Based on the BISON general public license,
                   copyright 1988 Richard M. Stallman)

 Everyone is permitted to copy and distribute verbatim copies of this
 license, but changing it is not allowed.  You can also use this wording to
 make the terms for other programs.

  The license agreements of most software companies keep you at the mercy of
those companies.  By contrast, our general public license is intended to give
everyone the right to share NetHack.  To make sure that you get the rights we
want you to have, we need to make restrictions that forbid anyone to deny you
these rights or to ask you to surrender the rights.  Hence this license
agreement.

  Specifically, we want to make sure that you have the right to give away
copies of NetHack, that you receive source code or else can get it if you
want it, that you can change NetHack or use pieces of it in new free
programs, and that you know you can do these things.

  To make sure that everyone has such rights, we have to forbid you to
deprive anyone else of these rights.  For example, if you distribute copies
of NetHack, you must give the recipients all the rights that you have.  You
must make sure that they, too, receive or can get the source code.  And you
must tell them their rights.

  Also, for our own protection, we must make certain that everyone finds out
that there is no warranty for NetHack.  If NetHack is modified by someone
else and passed on, we want its recipients to know that what they have is
not what we distributed.

  Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
the following terms which say what you must do to be allowed to distribute or
change NetHack.


                        COPYING POLICIES

  1. You may copy and distribute verbatim copies of NetHack source code as
you receive it, in any medium, provided that you keep intact the notices on
all files that refer to copyrights, to this License Agreement, and to the
absence of any warranty; and give any other recipients of the NetHack
program a copy of this License Agreement along with the program.

  2. You may modify your copy or copies of NetHack or any portion of it, and
copy and distribute such modifications under the terms of Paragraph 1 above
(including distributing this License Agreement), provided that you also do the
following:

    a) cause the modified files to carry prominent notices stating that you
    changed the files and the date of any change; and

    b) cause the whole of any work that you distribute or publish, that in
    whole or in part contains or is a derivative of NetHack or any part
    thereof, to be licensed at no charge to all third parties on terms
    identical to those contained in this License Agreement (except that you
    may choose to grant more extensive warranty protection to some or all
    third parties, at your option)

    c) You may charge a distribution fee for the physical act of
    transferring a copy, and you may at your option offer warranty protection
    in exchange for a fee.

  3. You may copy and distribute NetHack (or a portion or derivative of it,
under Paragraph 2) in object code or executable form under the terms of
Paragraphs 1 and 2 above provided that you also do one of the following:

    a) accompany it with the complete machine-readable source code, which
    must be distributed under the terms of Paragraphs 1 and 2 above; or,

    b) accompany it with full information as to how to obtain the complete
    machine-readable source code from an appropriate archive site.  (This
    alternative is allowed only for noncommercial distribution.)

For these purposes, complete source code means either the full source
distribution as originally released over Usenet or updated copies of the
files in this distribution used to create the object code or executable.

  4. You may not copy, sublicense, distribute or transfer NetHack except as
expressly provided under this License Agreement.  Any attempt otherwise to
copy, sublicense, distribute or transfer NetHack is void and your rights to
use the program under this License agreement shall be automatically
terminated.  However, parties who have received computer software programs
from you with this License Agreement will not have their licenses terminated
so long as such parties remain in full compliance.


Stated plainly:  You are permitted to modify NetHack, or otherwise use parts
of NetHack, provided that you comply with the conditions specified above;
in particular, your modified NetHack or program containing parts of NetHack
must remain freely available as provided in this License Agreement.  In
other words, go ahead and share NetHack, but don't try to stop anyone else
from sharing it farther.

Copyright (c) 2011, Oracle and/or its affiliates. All rights reserved.