summaryrefslogtreecommitdiffstats
path: root/meta/files/common-licenses/NGPL
diff options
context:
space:
mode:
Diffstat (limited to 'meta/files/common-licenses/NGPL')
-rw-r--r--meta/files/common-licenses/NGPL102
1 files changed, 102 insertions, 0 deletions
diff --git a/meta/files/common-licenses/NGPL b/meta/files/common-licenses/NGPL
new file mode 100644
index 0000000000..31beeffc87
--- /dev/null
+++ b/meta/files/common-licenses/NGPL
@@ -0,0 +1,102 @@
1
2
3NETHACK GENERAL PUBLIC LICENSE
4
5(Copyright 1989 M. Stephenson)
6(Based on the BISON general public license, copyright 1988 Richard M. Stallman)
7
8Everyone is permitted to copy and distribute verbatim copies of this license,
9but changing it is not allowed. You can also use this wording to make the terms
10for other programs.
11The license agreements of most software companies keep you at the mercy of
12those companies. By contrast, our general public license is intended to give
13everyone the right to share NetHack. To make sure that you get the rights we
14want you to have, we need to make restrictions that forbid anyone to deny you
15these rights or to ask you to surrender the rights. Hence this license
16agreement.
17
18Specifically, we want to make sure that you have the right to give away copies
19of NetHack, that you receive source code or else can get it if you want it,
20that you can change NetHack or use pieces of it in new free programs, and that
21you know you can do these things.
22
23To make sure that everyone has such rights, we have to forbid you to deprive
24anyone else of these rights. For example, if you distribute copies of NetHack,
25you must give the recipients all the rights that you have. You must make sure
26that they, too, receive or can get the source code. And you must tell them
27their rights.
28
29Also, for our own protection, we must make certain that everyone finds out that
30there is no warranty for NetHack. If NetHack is modified by someone else and
31passed on, we want its recipients to know that what they have is not what we
32distributed.
33
34Therefore we (Mike Stephenson and other holders of NetHack copyrights) make the
35following terms which say what you must do to be allowed to distribute or
36change NetHack.
37
38COPYING POLICIES
39
40You may copy and distribute verbatim copies of NetHack source code as you
41receive it, in any medium, provided that you keep intact the notices on all
42files that refer to copyrights, to this License Agreement, and to the absence
43of any warranty; and give any other recipients of the NetHack program a copy of
44this License Agreement along with the program.
45You may modify your copy or copies of NetHack or any portion of it, and copy
46and distribute such modifications under the terms of Paragraph 1 above
47(including distributing this License Agreement), provided that you also do the
48following:
49a) cause the modified files to carry prominent notices stating that you changed
50the files and the date of any change; and
51
52b) cause the whole of any work that you distribute or publish, that in whole or
53in part contains or is a derivative of NetHack or any part thereof, to be
54licensed at no charge to all third parties on terms identical to those
55contained in this License Agreement (except that you may choose to grant more
56extensive warranty protection to some or all third parties, at your option)
57
58c) You may charge a distribution fee for the physical act of transferring a
59copy, and you may at your option offer warranty protection in exchange for a
60fee.
61
62You may copy and distribute NetHack (or a portion or derivative of it, under
63Paragraph 2) in object code or executable form under the terms of Paragraphs 1
64and 2 above provided that you also do one of the following:
65a) accompany it with the complete machine-readable source code, which must be
66distributed under the terms of Paragraphs 1 and 2 above; or,
67
68b) accompany it with full information as to how to obtain the complete machine-
69readable source code from an appropriate archive site. (This alternative is
70allowed only for noncommercial distribution.)
71
72For these purposes, complete source code means either the full source
73distribution as originally released over Usenet or updated copies of the files
74in this distribution used to create the object code or executable.
75
76You may not copy, sublicense, distribute or transfer NetHack except as
77expressly provided under this License Agreement. Any attempt otherwise to copy,
78sublicense, distribute or transfer NetHack is void and your rights to use the
79program under this License agreement shall be automatically terminated.
80However, parties who have received computer software programs from you with
81this License Agreement will not have their licenses terminated so long as such
82parties remain in full compliance.
83Stated plainly: You are permitted to modify NetHack, or otherwise use parts of
84NetHack, provided that you comply with the conditions specified above; in
85particular, your modified NetHack or program containing parts of NetHack must
86remain freely available as provided in this License Agreement. In other words,
87go ahead and share NetHack, but don't try to stop anyone else from sharing it
88farther.
89[ Home | Version 3.4.3 | Contact Us ]
90
91
92
93Hosted by:
94NetHack is Copyright 1985-2003 by Stichting Mathematisch Centrum and M.
95Stephenson. See our license for details.
96This site is Copyright 1999-2009 by Kenneth Lorber, Kensington, Maryland.
97
98
99
100
101
102