mirror of
https://github.com/nmap/nmap.git
synced 2025-12-21 06:59:01 +00:00
Minor source code header improvements
This commit is contained in:
26
COPYING
26
COPYING
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
MACLookup.cc
26
MACLookup.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
MACLookup.h
26
MACLookup.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
NmapOps.cc
26
NmapOps.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
NmapOps.h
26
NmapOps.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
Target.cc
26
Target.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
Target.h
26
Target.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
charpool.cc
26
charpool.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
charpool.h
26
charpool.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
config.h.in
26
config.h.in
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
idle_scan.cc
26
idle_scan.cc
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
idle_scan.h
26
idle_scan.h
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
main.cc
26
main.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap.cc
26
nmap.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap.h
26
nmap.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_dns.cc
26
nmap_dns.cc
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_dns.h
26
nmap_dns.h
@@ -3,17 +3,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -36,7 +36,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_error.h
26
nmap_error.h
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_rpc.cc
26
nmap_rpc.cc
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_rpc.h
26
nmap_rpc.h
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_tty.cc
26
nmap_tty.cc
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
nmap_tty.h
26
nmap_tty.h
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -4,17 +4,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -37,7 +37,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
osscan.cc
26
osscan.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
osscan.h
26
osscan.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
osscan2.cc
26
osscan2.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
osscan2.h
26
osscan2.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
41
output.cc
41
output.cc
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
@@ -1338,7 +1338,7 @@ void printosscanoutput(Target *currenths) {
|
|||||||
log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n");
|
log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT, "\n");
|
||||||
}
|
}
|
||||||
if (osscanSys == 2 && !reason) {
|
if (osscanSys == 2 && !reason) {
|
||||||
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n",
|
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No exact OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
|
||||||
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
||||||
currenths->v4hostip(), distance, currenths->MACAddress(),
|
currenths->v4hostip(), distance, currenths->MACAddress(),
|
||||||
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
||||||
@@ -1364,7 +1364,7 @@ void printosscanoutput(Target *currenths) {
|
|||||||
if ((o.verbose > 1 || o.debugging) && reason)
|
if ((o.verbose > 1 || o.debugging) && reason)
|
||||||
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason);
|
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"OS fingerprint not ideal because: %s\n", reason);
|
||||||
if (osscanSys == 2 && !reason) {
|
if (osscanSys == 2 && !reason) {
|
||||||
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).\nTCP/IP fingerprint:\n%s\n",
|
log_write(LOG_NORMAL|LOG_SKID_NOXLT|LOG_STDOUT,"No OS matches for host (If you know what OS is running on it, see http://insecure.org/nmap/submit/ ).\nTCP/IP fingerprint:\n%s\n",
|
||||||
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
mergeFPs(FPR->FPs, FPR->numFPs, true,
|
||||||
currenths->v4hostip(), distance, currenths->MACAddress(),
|
currenths->v4hostip(), distance, currenths->MACAddress(),
|
||||||
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
FPR->osscan_opentcpport, FPR->osscan_closedtcpport, FPR->osscan_closedudpport,
|
||||||
@@ -1593,13 +1593,20 @@ void printfinaloutput() {
|
|||||||
|
|
||||||
gettimeofday(&tv, NULL);
|
gettimeofday(&tv, NULL);
|
||||||
timep = time(NULL);
|
timep = time(NULL);
|
||||||
|
|
||||||
if (o.numhosts_scanned == 0)
|
if (o.numhosts_scanned == 0)
|
||||||
fprintf(stderr, "WARNING: No targets were specified, so 0 hosts scanned.\n");
|
fprintf(stderr, "WARNING: No targets were specified, so 0 hosts scanned.\n");
|
||||||
if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan &&
|
if (o.numhosts_scanned == 1 && o.numhosts_up == 0 && !o.listscan &&
|
||||||
o.pingtype != PINGTYPE_NONE)
|
o.pingtype != PINGTYPE_NONE)
|
||||||
log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n");
|
log_write(LOG_STDOUT, "Note: Host seems down. If it is really up, but blocking our ping probes, try -P0\n");
|
||||||
/* log_write(LOG_NORMAL|LOG_SKID|LOG_STDOUT,"\n"); */
|
|
||||||
|
if (o.osscan && o.servicescan)
|
||||||
|
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
|
||||||
|
else if (o.osscan)
|
||||||
|
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "OS detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
|
||||||
|
else if (o.servicescan)
|
||||||
|
log_write(LOG_STDOUT|LOG_NORMAL|LOG_SKID, "Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .\n");
|
||||||
|
|
||||||
log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0);
|
log_write(LOG_STDOUT|LOG_SKID, "Nmap finished: %d %s (%d %s up) scanned in %.3f seconds\n", o.numhosts_scanned, (o.numhosts_scanned == 1)? "IP address" : "IP addresses", o.numhosts_up, (o.numhosts_up == 1)? "host" : "hosts", o.TimeSinceStartMS(&tv) / 1000.0);
|
||||||
if (o.verbose && o.isr00t && o.RawScan())
|
if (o.verbose && o.isr00t && o.RawScan())
|
||||||
log_write(LOG_STDOUT|LOG_SKID, " %s\n",
|
log_write(LOG_STDOUT|LOG_SKID, " %s\n",
|
||||||
|
|||||||
26
output.h
26
output.h
@@ -9,17 +9,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
portlist.cc
26
portlist.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
portlist.h
26
portlist.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
protocols.cc
26
protocols.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
protocols.h
26
protocols.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
1191
scripts/fingerfix.pl
1191
scripts/fingerfix.pl
File diff suppressed because it is too large
Load Diff
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -1,16 +1,16 @@
|
|||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -33,7 +33,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -46,7 +46,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
services.cc
26
services.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
services.h
26
services.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
targets.cc
26
targets.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
targets.h
26
targets.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
tcpip.cc
26
tcpip.cc
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
tcpip.h
26
tcpip.h
@@ -6,17 +6,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
timing.cc
26
timing.cc
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
timing.h
26
timing.h
@@ -7,17 +7,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -53,7 +53,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
utils.cc
26
utils.cc
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
26
utils.h
26
utils.h
@@ -5,17 +5,17 @@
|
|||||||
* *
|
* *
|
||||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||||
* *
|
* *
|
||||||
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap *
|
* The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
|
||||||
* is also a registered trademark of Insecure.Com LLC. This program is *
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
||||||
* free software; you may redistribute and/or modify it under the *
|
* software; you may redistribute and/or modify it under the terms of the *
|
||||||
* terms of the GNU General Public License as published by the Free *
|
* GNU General Public License as published by the Free Software *
|
||||||
* Software Foundation; Version 2. This guarantees your right to use, *
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* below. This guarantees your right to use, modify, and redistribute *
|
||||||
* you wish to embed Nmap technology into proprietary software, we may be *
|
* this software under certain conditions. If you wish to embed Nmap *
|
||||||
* willing to sell alternative licenses (contact sales@insecure.com). *
|
* technology into proprietary software, we sell alternative licenses *
|
||||||
* Many security scanner vendors already license Nmap technology such as *
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
||||||
* our remote OS fingerprinting database and code, service/version *
|
* license Nmap technology such as host discovery, port scanning, OS *
|
||||||
* detection system, and port scanning code. *
|
* detection, and version detection. *
|
||||||
* *
|
* *
|
||||||
* Note that the GPL places important restrictions on "derived works", yet *
|
* Note that the GPL places important restrictions on "derived works", yet *
|
||||||
* it does not provide a detailed definition of that term. To avoid *
|
* it does not provide a detailed definition of that term. To avoid *
|
||||||
@@ -38,7 +38,7 @@
|
|||||||
* These restrictions only apply when you actually redistribute Nmap. For *
|
* These restrictions only apply when you actually redistribute Nmap. For *
|
||||||
* example, nothing stops you from writing and selling a proprietary *
|
* example, nothing stops you from writing and selling a proprietary *
|
||||||
* front-end to Nmap. Just distribute it by itself, and point people to *
|
* front-end to Nmap. Just distribute it by itself, and point people to *
|
||||||
* http://insecure.org/nmap/ to download Nmap. *
|
* http://insecure.org/nmap/ to download Nmap. *
|
||||||
* *
|
* *
|
||||||
* We don't consider these to be added restrictions on top of the GPL, but *
|
* We don't consider these to be added restrictions on top of the GPL, but *
|
||||||
* just a clarification of how we interpret "derived works" as it applies *
|
* just a clarification of how we interpret "derived works" as it applies *
|
||||||
@@ -51,7 +51,7 @@
|
|||||||
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
||||||
* we also offer alternative license to integrate Nmap into proprietary *
|
* we also offer alternative license to integrate Nmap into proprietary *
|
||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of security vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates as well as helping to *
|
* as providing for priority support and updates as well as helping to *
|
||||||
* fund the continued development of Nmap technology. Please email *
|
* fund the continued development of Nmap technology. Please email *
|
||||||
* sales@insecure.com for further information. *
|
* sales@insecure.com for further information. *
|
||||||
|
|||||||
Reference in New Issue
Block a user