Cisco Cisco Email Security Appliance C680

Seite von 172
             Open Source Used In AsyncOS 7.8 for Email                                                                                                                                     52
* to the following restrictions:
*
* 1. Neither the authors nor Purdue University are responsible for any
*    consequences of the use of this software.
*
* 2. The origin of this software must not be misrepresented, either by
*    explicit claim or by omission.  Credit to the authors and Purdue
*    University must appear in documentation and sources.
*
* 3. Altered versions must be plainly marked as such, and must not be
*    misrepresented as being the original software.
*
* 4. This notice may not be removed or altered.
*/
 
1.22 Net-SNMP 5.4.2.1 
1.22.1 Available under license : 
Various copyrights apply to this package, listed in various separate
parts below.  Please make sure that you read all the parts.
 
---- Part 1: CMU/UCD copyright notice: (BSD like) -----
 
 
      Copyright 1989, 1991, 1992 by Carnegie Mellon University
 
  Derivative Work - 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California
 
 All Rights Reserved
 
Permission to use, copy, modify and distribute this software and its
documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appears in all copies and
that both that copyright notice and this permission notice appear in
supporting documentation, and that the name of CMU and The Regents of
the University of California not be used in advertising or publicity
pertaining to distribution of the software without specific written
permission.
 
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL
WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL CMU OR
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN