You are on page 1of 2

INFORMATION ABOUT THIRD-PARTY CODE

----------------------------------------------------------------------------This file contains information about third-party code which was used in the deve
lopment of the Application.
Organization of the file:
* SOFTWARE CODE
* OTHER INFORMATION
=============================================================================
SOFTWARE CODE
Information about third-party software code used in the development of the Appli
cation.
libarchive
Copyright (c) 2011-2012 libarchive Project. All rights reserved.
Copyright (c) 2003-2011 Tim Kientzle. All rights reserved.
Copyright (c) 2001 The NetBSD Foundation, Inc. All rights reserved.
Copyright (c) 2012 Ondrej Holy. All rights reserved.
Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies). Author: Jonas
Gastal <jgastal@profusion.mobi>
Copyright (c) 2011-2012 Michihiro NAKAJIMA
----------------------------------------------------------------------The BSD 2-Clause License
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this l
ist of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, thi
s list of conditions and the following disclaimer in the documentation and/or ot
her materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WA
RRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT
, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, D
ATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF L
IABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE O
R OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
----------------------------------------------------------------------Zlib 1.2.3
Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler
----------------------------------------------------------------------==
the Zlib License
==
This software is provided 'as-is', without any express or implied warranty. In
no event will the authors be held liable for any damages arising from the use of
this software.
Permission is granted to anyone to use this software for any purpose, including
commercial applications, and to alter it and redistribute it freely, subject to

the following restrictions:


1. The origin of this software must not be misrepresented; you must not claim th
at you wrote the original software. If you use this software in a product, an ac
knowledgment in the product documentation would be appreciated but is not requir
ed.
2. Altered source versions must be plainly marked as such, and must not be misre
presented as being the original software.
3. This notice may not be removed or altered from any source distribution.
----------------------------------------------------------------------=============================================================================
OTHER INFORMATION
The Application may include some software programs that are licensed (or sublice
nsed) to the user under the GNU General Public License (GPL) or other similar fr
ee software licenses which, among other rights, permit the user to copy, modify
and redistribute certain programs, or portions thereof, and have access to the s
ource code ("Open Source Software"). If such licenses require that for any softw
are, which is distributed to someone in an executable binary format, that the so
urce code also be made available to those users, then the source code should be
made available by sending the request to source@kaspersky.com or the source code
is supplied with the Application.

You might also like