
Copyright © 2002-2012 Tenable Network Security, Inc.
APPENDIX 4: NON-TENABLE LICENSE DECLARATIONS AND
PATENT
Below you will find 3
rd
party software packages that Tenable provides for use with the
Passive Vulnerability Scanner (Patent 7,761,918 B2).
Section 1 (b) (ii) of the Passive Vulnerability Scanner License Agreement reads:
(ii) The Software may include code or other intellectual property provided to Tenable by
third parties, including Plug-Ins that are not owned by Tenable, (collectively, “Third Party
Components”). Any Third Party Component that is not marked as copyrighted by Tenable is
subject to other license terms that are specified in the Documentation. By using the
Software, you hereby agree to be bound by such other license terms as specified in the
Documentation.
RELATED 3
RD
PARTY AND OPEN-SOURCE LICENSES
blowfish.h
This product incl
udes cryptograph
ic software written by
Eric Young (
[email protected]).
crypto/bf/blowfish.h
All rights reserved.
This package is an SSL implementation written by Eric Young
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the
following conditions are aheared to. The following conditions apply to all
code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code;
not just the SSL code. The SSL documentation included with this distribution
is covered by the same copyright terms except that the holder is Tim Hudson
Copyright remains Eric Young's, and as such any Copyright notices in the code
are not to be removed. If this package is used in a product, Eric Young
should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in
documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
"This product includes cryptographic software written by Eric Young
Komentarze do niniejszej Instrukcji