ali@0
|
1 |
NETHACK GENERAL PUBLIC LICENSE
|
ali@0
|
2 |
(Copyright 1989 M. Stephenson)
|
ali@0
|
3 |
|
ali@0
|
4 |
(Based on the BISON general public license,
|
ali@0
|
5 |
copyright 1988 Richard M. Stallman)
|
ali@0
|
6 |
|
ali@0
|
7 |
Everyone is permitted to copy and distribute verbatim copies of this
|
ali@0
|
8 |
license, but changing it is not allowed. You can also use this wording to
|
ali@0
|
9 |
make the terms for other programs.
|
ali@0
|
10 |
|
ali@0
|
11 |
The license agreements of most software companies keep you at the mercy of
|
ali@0
|
12 |
those companies. By contrast, our general public license is intended to give
|
ali@0
|
13 |
everyone the right to share NetHack. To make sure that you get the rights we
|
ali@0
|
14 |
want you to have, we need to make restrictions that forbid anyone to deny you
|
ali@0
|
15 |
these rights or to ask you to surrender the rights. Hence this license
|
ali@0
|
16 |
agreement.
|
ali@0
|
17 |
|
ali@0
|
18 |
Specifically, we want to make sure that you have the right to give away
|
ali@0
|
19 |
copies of NetHack, that you receive source code or else can get it if you
|
ali@0
|
20 |
want it, that you can change NetHack or use pieces of it in new free
|
ali@0
|
21 |
programs, and that you know you can do these things.
|
ali@0
|
22 |
|
ali@0
|
23 |
To make sure that everyone has such rights, we have to forbid you to
|
ali@0
|
24 |
deprive anyone else of these rights. For example, if you distribute copies
|
ali@0
|
25 |
of NetHack, you must give the recipients all the rights that you have. You
|
ali@0
|
26 |
must make sure that they, too, receive or can get the source code. And you
|
ali@0
|
27 |
must tell them their rights.
|
ali@0
|
28 |
|
ali@0
|
29 |
Also, for our own protection, we must make certain that everyone finds out
|
ali@0
|
30 |
that there is no warranty for NetHack. If NetHack is modified by someone
|
ali@0
|
31 |
else and passed on, we want its recipients to know that what they have is
|
ali@0
|
32 |
not what we distributed.
|
ali@0
|
33 |
|
ali@0
|
34 |
Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
|
ali@0
|
35 |
the following terms which say what you must do to be allowed to distribute or
|
ali@0
|
36 |
change NetHack.
|
ali@0
|
37 |
|
ali@0
|
38 |
|
ali@0
|
39 |
COPYING POLICIES
|
ali@0
|
40 |
|
ali@0
|
41 |
1. You may copy and distribute verbatim copies of NetHack source code as
|
ali@0
|
42 |
you receive it, in any medium, provided that you keep intact the notices on
|
ali@0
|
43 |
all files that refer to copyrights, to this License Agreement, and to the
|
ali@0
|
44 |
absence of any warranty; and give any other recipients of the NetHack
|
ali@0
|
45 |
program a copy of this License Agreement along with the program.
|
ali@0
|
46 |
|
ali@0
|
47 |
2. You may modify your copy or copies of NetHack or any portion of it, and
|
ali@0
|
48 |
copy and distribute such modifications under the terms of Paragraph 1 above
|
ali@0
|
49 |
(including distributing this License Agreement), provided that you also do the
|
ali@0
|
50 |
following:
|
ali@0
|
51 |
|
ali@0
|
52 |
a) cause the modified files to carry prominent notices stating that you
|
ali@0
|
53 |
changed the files and the date of any change; and
|
ali@0
|
54 |
|
ali@0
|
55 |
b) cause the whole of any work that you distribute or publish, that in
|
ali@0
|
56 |
whole or in part contains or is a derivative of NetHack or any part
|
ali@0
|
57 |
thereof, to be licensed at no charge to all third parties on terms
|
ali@0
|
58 |
identical to those contained in this License Agreement (except that you
|
ali@0
|
59 |
may choose to grant more extensive warranty protection to some or all
|
ali@0
|
60 |
third parties, at your option)
|
ali@0
|
61 |
|
ali@0
|
62 |
c) You may charge a distribution fee for the physical act of
|
ali@0
|
63 |
transferring a copy, and you may at your option offer warranty protection
|
ali@0
|
64 |
in exchange for a fee.
|
ali@0
|
65 |
|
ali@0
|
66 |
3. You may copy and distribute NetHack (or a portion or derivative of it,
|
ali@0
|
67 |
under Paragraph 2) in object code or executable form under the terms of
|
ali@0
|
68 |
Paragraphs 1 and 2 above provided that you also do one of the following:
|
ali@0
|
69 |
|
ali@0
|
70 |
a) accompany it with the complete machine-readable source code, which
|
ali@0
|
71 |
must be distributed under the terms of Paragraphs 1 and 2 above; or,
|
ali@0
|
72 |
|
ali@0
|
73 |
b) accompany it with full information as to how to obtain the complete
|
ali@0
|
74 |
machine-readable source code from an appropriate archive site. (This
|
ali@0
|
75 |
alternative is allowed only for noncommercial distribution.)
|
ali@0
|
76 |
|
ali@0
|
77 |
For these purposes, complete source code means either the full source
|
ali@0
|
78 |
distribution as originally released over Usenet or updated copies of the
|
ali@0
|
79 |
files in this distribution used to create the object code or executable.
|
ali@0
|
80 |
|
ali@0
|
81 |
4. You may not copy, sublicense, distribute or transfer NetHack except as
|
ali@0
|
82 |
expressly provided under this License Agreement. Any attempt otherwise to
|
ali@0
|
83 |
copy, sublicense, distribute or transfer NetHack is void and your rights to
|
ali@0
|
84 |
use the program under this License agreement shall be automatically
|
ali@0
|
85 |
terminated. However, parties who have received computer software programs
|
ali@0
|
86 |
from you with this License Agreement will not have their licenses terminated
|
ali@0
|
87 |
so long as such parties remain in full compliance.
|
ali@0
|
88 |
|
ali@0
|
89 |
|
ali@0
|
90 |
Stated plainly: You are permitted to modify NetHack, or otherwise use parts
|
ali@0
|
91 |
of NetHack, provided that you comply with the conditions specified above;
|
ali@0
|
92 |
in particular, your modified NetHack or program containing parts of NetHack
|
ali@0
|
93 |
must remain freely available as provided in this License Agreement. In
|
ali@0
|
94 |
other words, go ahead and share NetHack, but don't try to stop anyone else
|
ali@0
|
95 |
from sharing it farther.
|