1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-21 06:59:01 +00:00

Minor source code header improvements

This commit is contained in:
fyodor
2006-08-25 01:47:49 +00:00
parent 1d2069a2bd
commit b28d51167c
70 changed files with 1520 additions and 1480 deletions

26
COPYING
View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -42,7 +42,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -42,7 +42,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

26
main.cc
View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

26
nmap.cc
View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

26
nmap.h
View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -3,17 +3,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -36,7 +36,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -49,7 +49,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -4,17 +4,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -37,7 +37,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -50,7 +50,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -42,7 +42,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *
@@ -1338,7 +1338,7 @@ void printosscanoutput(Target *currenths) {
log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n"); log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n");
} }
if (osscanSys == 2 && !reason) { if (osscanSys == 2 && !reason) {
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n", log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
mergeFPs(FPR->FPs, FPR->numFPs, true, mergeFPs(FPR->FPs, FPR->numFPs, true,
currenths->v4hostip(), distance, currenths->MACAddress(), currenths->v4hostip(), distance, currenths->MACAddress(),
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport, FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
@@ -1364,7 +1364,7 @@ void printosscanoutput(Target *currenths) {
if ((o.verbose > 1 || o.debugging) && reason) if ((o.verbose > 1 || o.debugging) && reason)
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason); log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason);
if (osscanSys == 2 && !reason) { if (osscanSys == 2 && !reason) {
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n", log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
mergeFPs(FPR->FPs, FPR->numFPs, true, mergeFPs(FPR->FPs, FPR->numFPs, true,
currenths->v4hostip(), distance, currenths->MACAddress(), currenths->v4hostip(), distance, currenths->MACAddress(),
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport, FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
@@ -1593,13 +1593,20 @@ void printfinaloutput() {
gettimeofday(&tv, NULL); gettimeofday(&tv, NULL);
timep = time(NULL); timep = time(NULL);
if (o.numhosts_scanned == 0) if (o.numhosts_scanned == 0)
fprintf(stderr, "WARNING: No targets were specified, so 0 hosts scanned.\n"); fprintf(stderr, "WARNING: No targets were specified, so 0 hosts scanned.\n");
if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan && if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan &&
o.pingtype != PINGTYPE_NONE) o.pingtype != PINGTYPE_NONE)
log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n"); log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n");
/* log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT,"\n"); */
if (o.osscan && o.servicescan)
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
else if (o.osscan)
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
else if (o.servicescan)
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0); log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0);
if (o.verbose && o.isr00t && o.RawScan()) if (o.verbose && o.isr00t && o.RawScan())
log_write(LOG_STDOUT|LOG_SKID, " %s\n", log_write(LOG_STDOUT|LOG_SKID, " %s\n",

View File

@@ -9,17 +9,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -42,7 +42,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -55,7 +55,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

File diff suppressed because it is too large Load Diff

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -1,16 +1,16 @@
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -33,7 +33,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -46,7 +46,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

26
tcpip.h
View File

@@ -6,17 +6,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -39,7 +39,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -52,7 +52,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -7,17 +7,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -40,7 +40,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -53,7 +53,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *

26
utils.h
View File

@@ -5,17 +5,17 @@
* * * *
***********************IMPORTANT NMAP LICENSE TERMS************************ ***********************IMPORTANT NMAP LICENSE TERMS************************
* * * *
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap * * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
* is also a registered trademark of Insecure.Com LLC. This program is * * also a registered trademark of Insecure.Com LLC. This program is free *
* free software; you may redistribute and/or modify it under the * * software; you may redistribute and/or modify it under the terms of the *
* terms of the GNU General Public License as published by the Free * * GNU General Public License as published by the Free Software *
* Software Foundation; Version 2. This guarantees your right to use, * * Foundation; Version 2 with the clarifications and exceptions described *
* modify, and redistribute this software under certain conditions. If * * below. This guarantees your right to use, modify, and redistribute *
* you wish to embed Nmap technology into proprietary software, we may be * * this software under certain conditions. If you wish to embed Nmap *
* willing to sell alternative licenses (contact sales@insecure.com). * * technology into proprietary software, we sell alternative licenses *
* Many security scanner vendors already license Nmap technology such as * * (contact sales@insecure.com). Dozens of software vendors already *
* our remote OS fingerprinting database and code, service/version * * license Nmap technology such as host discovery, port scanning, OS *
* detection system, and port scanning code. * * detection, and version detection. *
* * * *
* Note that the GPL places important restrictions on "derived works", yet * * Note that the GPL places important restrictions on "derived works", yet *
* it does not provide a detailed definition of that term. To avoid * * it does not provide a detailed definition of that term. To avoid *
@@ -38,7 +38,7 @@
* These restrictions only apply when you actually redistribute Nmap. For * * These restrictions only apply when you actually redistribute Nmap. For *
* example, nothing stops you from writing and selling a proprietary * * example, nothing stops you from writing and selling a proprietary *
* front-end to Nmap. Just distribute it by itself, and point people to * * front-end to Nmap. Just distribute it by itself, and point people to *
* http://insecure.org/nmap/ to download Nmap. * * http://insecure.org/nmap/ to download Nmap. *
* * * *
* We don't consider these to be added restrictions on top of the GPL, but * * We don't consider these to be added restrictions on top of the GPL, but *
* just a clarification of how we interpret "derived works" as it applies * * just a clarification of how we interpret "derived works" as it applies *
@@ -51,7 +51,7 @@
* Nmap in non-GPL works, we would be happy to help. As mentioned above, * * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
* we also offer alternative license to integrate Nmap into proprietary * * we also offer alternative license to integrate Nmap into proprietary *
* applications and appliances. These contracts have been sold to dozens * * applications and appliances. These contracts have been sold to dozens *
* of security vendors, and generally include a perpetual license as well * * of software vendors, and generally include a perpetual license as well *
* as providing for priority support and updates as well as helping to * * as providing for priority support and updates as well as helping to *
* fund the continued development of Nmap technology. Please email * * fund the continued development of Nmap technology. Please email *
* sales@insecure.com for further information. * * sales@insecure.com for further information. *