CLI tool for running Playbooks
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

132 lines
6.2 KiB

1 year ago
  1. == Process Hacker ==
  2. Process Hacker is licensed under the GNU GPL v3, with exceptions. A full
  3. copy of the license is provided in LICENSE.txt.
  4. Copyright (C) 2009-2012 wj32 and various authors
  5. This program is free software: you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation, either version 3 of the License, or
  8. (at your option) any later version.
  9. This program is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>.
  15. == Mini-XML ==
  16. Process Hacker uses Mini-XML licensed under the following terms:
  17. The Mini-XML library and included programs are provided under the
  18. terms of the GNU Library General Public License (LGPL) with the
  19. following exceptions:
  20. 1. Static linking of applications to the Mini-XML library
  21. does not constitute a derivative work and does not require
  22. the author to provide source code for the application, use
  23. the shared Mini-XML libraries, or link their applications
  24. against a user-supplied version of Mini-XML.
  25. If you link the application to a modified version of
  26. Mini-XML, then the changes to Mini-XML must be provided
  27. under the terms of the LGPL in sections 1, 2, and 4.
  28. 2. You do not have to provide a copy of the Mini-XML license
  29. with programs that are linked to the Mini-XML library, nor
  30. do you have to identify the Mini-XML license in your
  31. program or documentation as required by section 6 of the
  32. LGPL.
  33. == PCRE ==
  34. Process Hacker uses Perl-Compatible Regular Expressions licensed under the
  35. following terms:
  36. PCRE is a library of functions to support regular expressions whose syntax
  37. and semantics are as close as possible to those of the Perl 5 language.
  38. Release 8 of PCRE is distributed under the terms of the "BSD" licence, as
  39. specified below.
  40. Redistribution and use in source and binary forms, with or without
  41. modification, are permitted provided that the following conditions are met:
  42. * Redistributions of source code must retain the above copyright notice,
  43. this list of conditions and the following disclaimer.
  44. * Redistributions in binary form must reproduce the above copyright
  45. notice, this list of conditions and the following disclaimer in the
  46. documentation and/or other materials provided with the distribution.
  47. * Neither the name of the University of Cambridge nor the name of Google
  48. Inc. nor the names of their contributors may be used to endorse or
  49. promote products derived from this software without specific prior
  50. written permission.
  51. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  52. AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  53. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  54. ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
  55. LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  56. CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  57. SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  58. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
  59. CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  60. ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
  61. POSSIBILITY OF SUCH DAMAGE.
  62. == MD5 ==
  63. Process Hacker uses a MD5 implementation licensed under the following terms:
  64. MD5 hash implementation and interface functions
  65. Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  66. This program is free software; you can redistribute it and/or modify
  67. it under the terms of the GNU General Public License version 2 as
  68. published by the Free Software Foundation.
  69. == SHA ==
  70. Process Hacker uses a SHA implementation licensed under the following terms:
  71. Copyright 2004 Filip Navara
  72. Based on public domain SHA code by Steve Reid <steve@edmweb.com>
  73. This library is free software; you can redistribute it and/or
  74. modify it under the terms of the GNU Lesser General Public
  75. License as published by the Free Software Foundation; either
  76. version 2.1 of the License, or (at your option) any later version.
  77. This library is distributed in the hope that it will be useful,
  78. but WITHOUT ANY WARRANTY; without even the implied warranty of
  79. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  80. Lesser General Public License for more details.
  81. You should have received a copy of the GNU Lesser General Public
  82. License along with this library; if not, write to the Free Software
  83. Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
  84. == Natural order string comparison ==
  85. Process Hacker uses "strnatcmp.c" licensed under the following terms:
  86. strnatcmp.c -- Perform 'natural order' comparisons of strings in C.
  87. Copyright (C) 2000, 2004 by Martin Pool <mbp sourcefrog net>
  88. This software is provided 'as-is', without any express or implied
  89. warranty. In no event will the authors be held liable for any damages
  90. arising from the use of this software.
  91. Permission is granted to anyone to use this software for any purpose,
  92. including commercial applications, and to alter it and redistribute it
  93. freely, subject to the following restrictions:
  94. 1. The origin of this software must not be misrepresented; you must not
  95. claim that you wrote the original software. If you use this software
  96. in a product, an acknowledgment in the product documentation would be
  97. appreciated but is not required.
  98. 2. Altered source versions must be plainly marked as such, and must not be
  99. misrepresented as being the original software.
  100. 3. This notice may not be removed or altered from any source distribution.
  101. This code has been modified for Process Hacker.