Eula Comodo

Published on January 2017 | Categories: Documents | Downloads: 33 | Comments: 0 | Views: 244
of 18
Download PDF   Embed   Report

Comments

Content

<div style="text-align:center"><p><strong>END USER LICENSE AND SUBSCRIBER AGREEME
NT<br />COMODO SECURITY SOFTWARE AND REMOTE PERSONAL COMPUTER SERVICE</strong></
p></div>
<div id="beta_block_1" style="display:none"><p /><p style="text-align:center"><s
trong>BETA</strong></p><p /></div>
<p>IMPORTANT – PLEASE READ THESE TERMS CAREFULLY BEFORE DOWNLOADING, INSTALLING, O
R USING COMODO’S ANTIVIRUS, FIREWALL OR INTERNET SECURITY SOFTWARE AND REMOTE PERS
ONAL COMPUTER SUPPORT SERVICES (THE "PRODUCTS") THE PRODUCTS MEANS ALL OF THE EL
ECTRONIC FILES PROVIDED EITHER BY DOWNLOAD OR ON PHYSICAL MEDIA (CD-ROM, DVD OR
OTHER MEDIA THAT IS PROVIDED WITH THIS LICENSE AGREEMENT.<br />
THIS AGREEMENT CONTAINS A BINDING ARBITRATION CLAUSE. BY DOWNLOADING, INSTALLING
, OR USING THE PRODUCTS, OR BY CLICKING ON "I ACCEPT" BELOW, YOU ACKNOWLEDGE THA
T YOU HAVE READ THIS AGREEMENT, THAT YOU UNDERSTAND IT, AND THAT YOU AGREE TO BE
BOUND BY ITS TERMS. IF YOU DO NOT AGREE TO THE TERMS HEREIN, DO NOT DOWNLOAD OR
USE THE SOFTWARE, SUBSCRIBE TO OR USE THE SERVICES, OR CLICK ON "I ACCEPT".
</p>
<p>This end user license and subscriber agreement is between you ("you" or "Subs
criber"), as either an individual or as a business entity, and either:</p>
<ol type="a">
<li>if you are not located in China, Comodo Security Solutions, Inc., wh
ich has its principal place of business at 1255 Broad Street, Suite 100, Clifton
, New Jersey 07013, or</li>
<li>if you are located in China, Beijing Comodo Software Development Co.
Ltd., which has its principal place of business at 401 Tower B., Fenglan Intern
ational Plaza, 32 Beidajie Xizhimen, Haidian District, Beijing, China. </li>
</ol>
<p>Both are referred to herein as "Comodo".</p>
<p>In exchange for your use of the Products, you agree as follows:</p>
<ol type="1">
<li><strong>License</strong>
<ol style="list-style-type:none">
<li>1.1. <u>Grant of License.</u> Comodo grants you a li
mited, non-exclusive, non-transferable, and revocable license to download, insta
ll, back-up, and use the Software and Services (collectively, the "Products") on
(1) one personal computer unless otherwise indicated under a valid license gran
ted by Comodo for the term that you have paid for, including any documentation
and files accompanying the Products. You shall not resell, lease, sell, modify,
reverse engineer, decompile, or create derivative works of the Software. All r
ights not expressly granted herein are reserved to Comodo. This License grant sh
all expire at the end of the paid subscription period or at the end of the trial
period.</li>
<li>1.2. <u>Restrictions.</u> The licenses granted herei
n are only valid if:</li>
<ol type="i">
<li>the Products are NOT modified in any manner;
</li>
<li>the Products are only installed and used in
accordance with your network security policies,</li>
<li>you posses the necessary authority and power
to install and use the Products,</li>
<li>you promptly pay all license fees when due,
and</li>
<li>this agreement is accepted without modificat
ion and has not been breached.</li>
</ol>
<li>1.3. <u>Registration.</u> When registering Products,
you must provide accurate information and must update the registration informat
ion if it changes. Comodo may limit your ability to use the Products if you fail
to complete a required registration process. You may also be required to select
a username and password. Maintaining the confidentiality of this password and u

sername is your responsibility. You must notify Comodo immediately of any unauth
orized use of your account.</li>
<li>1.4. <u>Limited License.</u> The licenses granted he
rein are only for the number of computers for which you paid for the Products. Y
ou can secure additional computers by obtaining a separate license for each comp
uter, which might require an additional fee. You must have a license for each co
mputer that accesses or use the Products prior to installing or using the Produc
ts</li>
<li>1.5. <u>Updates.</u> Comodo is not obligated to prov
ide updates to the Products. If an update is provided and the update is not acco
mpanied by an additional agreement, this agreement applies to your use and insta
llation of the update. Some Products update automatically without notice.</li>
<li>1.6. <u>Trial, Free, Evaluation, and Beta.</u> If th
is agreement pertains to a trial, free, beta, or evaluation version, the license
s granted herein terminate at the end of the trial or evaluation period or when
Comodo disables access to the Products. For a trial version of the Product if no
term is agreed or specifically set forth in the documentation that you receive
with this Product, then the term for the licenses granted herein shall be for th
e term that you purchased. The Limited Guarantee set forth in Section 3 herein,
is not offered with any Trial, Free, Evaluation or Beta Product. All trial, eval
uation, and beta licenses are limited to one per customer. Generally, credit car
d information is required to access a free trial. However, Comodo shall not char
ge your credit card until the trial period has ended. At the end of the trial pe
riod, Comodo may bill the credit card for the Products without further notice. P
articipants in a free trial are not entitled to a 30 day refund period as descri
bed in section 8.4. Your termination of this agreement prior to the end of the f
ree trial is required to avoid fees for the Products. Annual subscriptions expir
e one year from the end of the trial period. Comodo may deny or revoke a free tr
ial for any reason.</li>
</ol>
</li>
<li><strong>Specific Licenses - The Products may include the following
specific licenses:</strong>
<ol style="list-style-type:none">
<li>2.1. <u>Comodo Security Software.</u> Comodo Interne
t Security<span id="beta_inline_1" style="display:none"> Beta</span> (CIS) may b
e used royalty-free for both commercial and personal use. CIS includes the Comod
o Firewall and Antivirus products. No technical or customer support is provided
for CIS separate from the Products described in section 2.5. Installation of CIS
may include installation of additional Products. Use of these Products may be d
isabled until you pay for the Products.</li>
<li>2.2. <u>TrustConnect.</u> The TrustConnect client so
ftware is not included herein as a Product and is a derivate work of OpenVPN and
is licensed under both the terms of the OpenVPN license which is attached as Sc
hedule A and <a href="http://www.gnu.org/licenses/gpl-2.0.html">GPLv2</a>. The t
erms of the OpenVPN license do NOT apply to the services provided in connection
with the software. Instead, the terms of the service are governed solely by this
agreement and the Privacy Agreement referenced herein. Technical support is not
provided for TrustConnect</li>
<li>2.3. <u>Comodo Browser.</u> Comodo’s Chromium technolo
gy based browsers, under various monikers (such as Dragon, Secure Browser) which
are based on the Chromium software and sample code developed by Google, are lic
ensed under the BSD license. Other software included in this distribution is pro
vided under other licenses, as listed in Schedule B. Source code for software in
cluded in this distribution is available from the Chromium website. </li>
<ol style="list-style-type:none">
<li><strong>BSD License</strong></li>
<li>Copyright © 2008, The Chromium Authors
<br />All rights reserved.</li>
<li>Redistribution and use in source and

binary forms, with or without modification, are permitted provided that the fol
lowing conditions are met:</li>
<ul type="dot">
<li>Redistributions of source co
de must retain the above copyright notice, this list of conditions and the follo
wing disclaimer.</li>
<li>Redistributions in binary fo
rm must reproduce the above copyright notice, this list of conditions and the fo
llowing disclaimer in the documentation and/or other materials provided with the
distribution</li>
<li>Neither the name of the Goog
le Inc. nor the names of its contributors may be used to endorse or promote prod
ucts derived from this software without specific prior written permission.</li>
</ul>
</ol>
<li>2.4. <u>DNS Services.</u> </li>
<ol type="i">
<li>With your permission, CIS will recon
figure your DNS settings to point to the Comodo name servers to accept, process,
and resolve recursive DNS queries ("Recursive Traffic"). Comodo may re-direct o
r terminate Recursive Traffic that Comodo, in its sole discretion, determines or
considers to be harmful or invalid. You must not disclose the NameServer addres
ses to any third party who has not accepted this Agreement.</li>
<li>Upon termination of this agreement,
you must change your DNS settings away from Comodo’s NameServers. Comodo is not re
quired to provide access to alternative services at termination.</li>
<li>The DNS services contain links to we
bsites operated by third parties ("Third Party Sites"). These links are for your
convenience only. Comodo does not endorse, control, monitor, or verify the cont
ents of the Third Party Sites and is not liable for the contents or for any loss
, damage or injury sustained arising out of your access to the Third Party Sites
.</li>
</ol>
<li>2.5. <u>GeekBuddy or GeekBuddy Live Expert Services.
</u> </li>
<ol type="i">
<li>Comodo’s GeekBuddy or GeekBuddy Live E
xpert services (hereinafter "GEEKBUDDY") are Comodo’s paid-for chat-based support
services as described on the Comodo website. You are being provided with a licen
se to Comodo’s GeekBuddy services together with the Product only for the GeekBuddy
service term that you have purchased or for the duration of the free trial you
have selected. Comodo may discontinue offering and may terminate the free trial
version at any time. Comodo may change the specific scope of GEEKBUDDY without n
otice</li>
<li>GEEKBUDDY is provided only after you
contact the GEEKBUDDY support staff using software provided by Comodo. GEEKBUDD
Y is provided via Internet chat and remote desktop sharing, and access to the In
ternet is required to use GEEKBUDDY. You are responsible for providing and maint
aining your Internet connection. A high speed Internet connection is highly reco
mmended in order to avoid delays or problems with GEEKBUDDY. You are responsible
for ensuring that use of GEEKBUDDY complies with all applicable computer and ne
twork policies. Prior to using GEEKBUDDY, you must have administrator rights to
the computer, have a back-up of all data on the computer, and provide Comodo wit
h correct and accurate information.</li>
<li>You authorize Comodo to access your
computers and delete the files that Comodo deems unnecessary to your computers’ op
eration. You grant Comodo express permission to alter the registry of any comput
er using GEEKBUDDY and to install, configure, and use additional software on you
r computers as Comodo sees fit.</li>
<li>You shall assist Comodo as reasonabl

y requested by Comodo in diagnosing problems with computers using GEEKBUDDY. You
r failure to cooperate with the Comodo representative constitutes a breach of th
is agreement. The Comodo representative has sole discretion over any instruction
s and steps taken in providing the GEEKBUDDY services.</li>
<li>The Comodo support representative ma
y need to download, run, or use software on your computer to assist in diagnosin
g and resolving computer problems. Such software may include toolbars, utilities
, and other tools that allow Comodo to improve computer performance and solve te
chnical problems (collectively, the "Diagnostic Software"). Use of all Diagnosti
c Software is subject to the license agreements associated with the Diagnostic S
oftware and you must accept and comply with all such license agreements.</li>
<li>The scope and extent of GEEKBUDDY is
limited to the options selected by you when registering for GEEKBUDDY. Comodo p
erforms the GEEKBUDDY services in any manner it sees fit. GEEKBUDDY does not cov
er restoration services, repair services, lost or expected profits, lost or corr
upted data, lost or deleted work, or lost or damaged personal files. Comodo does
not guarantee against the loss of any file, information, or data. Unless your s
ubscription to the services states otherwise, you are solely responsible for bac
king up and safely storing its data, information, and files. You shall (1) obtai
n and pay for all equipment and third-party services required to use and receive
the GEEKBUDDY services and (2) be responsible for all content on both your comp
uter and network.</li>
<li>Comodo provides GEEKBUDDY using comm
ercially reasonable efforts. Comodo does not represent that that commercially re
asonable efforts will optimally configure a network or provide you with any sign
ificant energy savings</li>
</ol>
<li>2.6. <u>Auto Sandbox Services.</u> <br />Auto Sandbo
x is a service that isolates unknown programs. By default any unknown programs i
dentified as potential malware are executed inside sandbox and then automaticall
y sent to Comodo for malware analysis. If a program is found by Comodo to be mal
icious it is then added to the CIS malware definitions list. If it found to be s
afe it is added to CIS safe program list. The next time CIS receives antivirus u
pdates, CIS scans all the programs running inside sandbox. If any program is fou
nd to be malicious, sandbox isolates the program and moves it to the quarantine
list to protect your computer. Safe programs are removed from sandbox and are no
longer executed inside sandbox. To disable Auto Sandbox and/ or automatic submi
ssion of programs to Comodo, go to "Sandbox Settings" and uncheck the appropriat
e boxes.</li>
<li>2.7. <u>Browser Setting Modification.</u> <br />CIS
allows users to set the Yahoo search engine as the default setting in the intern
et browser search engine toolbars and makes <a href="http://www.yahoo.com">http:
//www.yahoo.com</a> as the browser home page. By checking the box during install
ation, you are consenting to this change. If after installation, you do not want
Yahoo as the default, you may make changes under the options section of your in
ternet browser.</li>
<li>2.8. <u>Backup Service.</u> Comodo shall provide you
with an interface necessary to use the backup services to make archived copies
of data contained on any computer where a valid license was installed.</li>
<ol type="i">
<li>When using the backup service and re
lated services, Comodo will save an encrypted copy of each file you designate as
requiring storage. The saved files will be transferred over the Internet to a s
erver operated by Comodo or an affiliate or partner of Comodo. Comodo disclaims
all liability for the backup service, including any resulting from lost or compr
omised data.</li>
<li>Comodo will routinely scan your comp
uter in order to determine if any file is new, modified, or deleted and to deter
mine what actions need to be taken in order to complete a storage or restoration
operations. These operations require Comodo to collect information related to y

our files, your computer configuration and specification, and your computer usag
e. You give Comodo permission to access, collect, and store this information. In
addition, you give Comodo permission to transmit all files designated by you as
requiring storage to a remote data center operated by Comodo or an affiliate or
partner of Comodo ("Storage Servers"). Files will be transmitted in an encrypte
d format.</li>
<li>Comodo will not use any files backed
up unless 1) you give Comodo permission to do so as part of a request for troub
leshooting or computer restoration services, or 2) Comodo reasonably believes it
needs to do so in order to comply with a law, subpoena, warrant, order, or regu
lation, including laws related to the use of data for illegal purposes or child
pornography. The services are being provided from within the United States and o
ther countries where litigants, law enforcement, courts, and other agencies of t
he government may have the right to access data stored within their jurisdiction
s upon terms and conditions provided by local law. As such, these entities may g
ain access to your data as provided under the local law of the jurisdiction.</li
>
<li>Files marked for storage shall only
be added to the Storage Server at the next periodic scan of your computer. Only
after a periodic scan will a file be available as part of the data on the Storag
e Server. Comodo does not maintain a copy of the data backed up to our servers a
nd does not guarantee the information against loss or destruction. In the event
that this Agreement is terminated, Comodo may in its sole discretion, without no
tice to you, and at any time following the date of termination delete or deny ac
cess to the backed up data and such data or files will not be available to you.
Comodo and its affiliates may retain (but shall have no obligation to retain) yo
ur data for up to 90 days after your subscription to the backup service expires
in order to allow you to renew your subscription, if desired.</li>
<li>Comodo does not maintain a copy of t
he data backed up to our servers and does not guarantee the information against
loss or destruction. In the event that the licenses granted herein are revoked,
lapse, or terminate, whether by you or by Comodo, Comodo may, in its sole and ab
solute discretion, without notice to you, delete or deny access to the backed up
data and such data or files will not be available to you. You agree that Comodo
and its affiliates may retain (but shall have no obligation to retain) your dat
a for a period after your trial or license has been terminated, expired, or othe
rwise lapsed, as part of Comodo’s marketing to you the opportunity to purchase, re
new, or extend a license.</li>
</ol>
</ol>
</li>
<li><strong>Limited Guarantee</strong>
<ol style="list-style-type:none">
<li>3.1. <u>Scope.</u> Some versions of the Products tha
t you may purchase include a limited guarantee that is valid for one year from t
he date of the Product’s activation by the original purchaser unless you cancel or
do not renew your Product subscription. The guarantee covers the repair of cert
ain damage that could occur to a computer as a result of malware. Each license o
f the guarantee can cover up to one computer on the same home network, provided
that each computer qualifies for guarantee coverage as explained herein. To qual
ify, a covered computer must have 1) the minimum requirements to install and run
the Product, 2) the guarantee activated using the license key provided by Comod
o, 3) the correct version of CIS installed on the computer, and 4) a full CIS sy
stem, computer, and memory scan run to verify that the computer is free from mal
ware. The guarantee does not apply if a computer 1) is unable to access the Inte
rnet, 2) more than one year has lapsed since the date of the Product’s activation
by the original purchaser, 3) the computer has preexisting malware, 4) does not
have CIS installed and operating in the correct functional state. After installi
ng the CIS, you must, on each covered computer, a) keep CIS operating at all tim
es in one of 1) Paranoid Mode, 2) Train with Safe Mode, or 3) Clean PC Mode; and

b) have Automatic Sandboxing enabled and configured to sandbox all unknown file
s; and c) not disable or remove CIS. The guarantee excludes all damage caused by
a hardware failure or caused by non-malware software. THE LIMITED GUARANTEE IS
ONLY AVAILABLE TO YOU IF YOU ARE A RESIDENT OF THE UNITED STATES AND HAVE PURCHA
SED A VERSION OF THE SOFTWARE THAT INCLUDES THE GUARANTEE. FREE, TRIAL, OR BETA
VERSIONS OF THE SOFTWARE DO NOT INCLUDE THE GUARANTEE. THE LIMITED GUARANTEE CAN
NOT BE COMBINED WITH ANY OTHER COMODO WARRANTY OR GUARANTEE. THE GUARANTEE IS NO
N-TRANSFERRABLE, AND CAN ONLY BE USED BY THE ORIGINAL PURCHASER OF THE SOFTWARE.
THE GUARANTEE IS ONLY VALID FOR CLAIMS MADE OVER THE INTERNET AS PER SECTION 3.
3 AND ONLY WHERE INTERNET-BASED SUPPORT IS RENDERED.</li>
<li>3.2. <u>Limits.</u> The guarantee is limited to the
lesser of</li>
<ol type="i">
<li>The actual cost of the computer;</li
>
<li>An aggregate total of $500 for all c
laims paid under a single license key, and</li>
<li>The actual cost of a Comodo specifie
d and authorized third party provider to repair the computer to an operating con
dition ("Guarantee Limit").</li>
</ol>
The guarantee is limited to the repair and resto
ration of the computer to a state prior to when the malware infected the compute
r. The guarantee does not cover claims for lost or expected profits, lost or cor
rupted data, lost or deleted work, or lost or damaged personal files. Comodo doe
s not guarantee against the loss of any file or information. The guarantee is vo
id if you breached this agreement, failed to follow the procedures described in
this Section 3, or failed to pay any fees applicable to your use of the Software
.
<li>3.3. <u>Claims.</u> If a computer qualifying under S
ection 3.1 becomes infected with malware you must take the following steps: 1) b
ackup all data on the computer, 2) promptly contact Comodo over the Internet by
email at: <a href="[email protected]">[email protected]</a>, and 3)
allow a Comodo support representative to remotely connect to the infected comput
er and remove the malware. Comodo only provides remediation services over the In
ternet and you must be able to access the Internet to use the limited guarantee.
Damage to a computer by anything other than malware is not covered by the limit
ed guarantee. If a Comodo support representative cannot connect to the computer
because of the malware, the limited guarantee does not apply. To qualify for a p
ayment under the limited guarantee, you must allow Comodo access to each infecte
d computer and must assist Comodo in any manner necessary to remove the malware
and repair the computer. Failure to cooperate with a Comodo representative voids
the guarantee. The instructions and steps necessary to fix the computer and pro
vide the support are in the Comodo representative’s sole discretion.</li>
<li>3.4. <u>Diagnostic Software.</u> The support represe
ntative may download, run, or use software on your computer to remove the malwar
e and restore the computer to its pre-infection operating condition. This softwa
re includes software that can control your computer remotely along with Diagnost
ic Software. You shall accept any license agreement required to use the Diagnost
ic Software. Use of the Diagnostic Software by the support representative does n
ot require any additional payment by you.</li>
<li>3.5. <u>Recording of Services.</u> Comodo may monito
r and record any remediation services provided. Comodo may release recorded info
rmation for any of 1) satisfying a law, regulation or government request, 2) ope
rating the remediation services properly, or 3) protecting Comodo’s business reput
ation, software, or customers.</li>
<li>3.6. <u>Payment.</u> If Comodo is able to connect to
your computer but is unable to restore a qualifying computer’s functionality and
remove the malware, Comodo shall, subject to the Guarantee Limits and at sole di
scretion, pay for Comodo’s choice of 1) the cost of having a third party provider

repair the computer or 2) for a replacement computer. If Comodo chooses to repai
r the computer, Comodo will provide instructions on where the computer may be de
livered for repair. If the repair facility is greater than 20 miles from your ph
ysical location, Comodo shall pay the cost of mail delivery of the computer but
you shall pay any applicable shipping insurance costs. You bear all risk of loss
during shipping to or from the repair facility. If the repair facility is unabl
e to restore the computer’s operating functionality before the end of the fifth bu
siness day after the repair facility’s receipt of the computer, Comodo shall pay y
ou, subject to the Guarantee Limits, the fair market value of each qualifying ir
reparable computer.</li>
</ol>
</li>
<li><strong>Personal Internet and Identity Coverage</strong>. Comodo’s per
sonal internet and identity coverage plan ("ID Protection") is offered to custom
ers who are residents of the United States and who register for the services and
become a member of the ID Protection policy. Only one customer may register per
license key. The terms of ID Protection are governed by the summary description
at: (<a href="https://accounts.comodo.com/cfp/management/idtheft">https://accou
nts.comodo.com/cfp/management/idtheft</a>).</li>
<li><strong>Ownership</strong>
<ol style="list-style-type:none">
<li>5.1. <u>No Ownership Rights.</u> The Products are be
ing licensed, not sold. Comodo retains all ownership rights in and to all Produc
ts, including any intellectual property rights therein</li>
<li>5.2. <u>Copyright.</u> The Products contains materia
l that is protected by United States and foreign intellectual property laws, inc
luding copyright, trade secret, and patent law. All rights not granted to you he
rein are expressly reserved by Comodo. You may not remove any copyright or other
proprietary notice of Comodo from the Products</li>
<li>5.3. <u>Content.</u> Content, including files, links
, images, and text, made available or accessible through the Products is the sol
e responsibility of the person or entity from whom it originated and is the prop
erty of the applicable owner. This agreement does not give any rights to such co
ntent. Comodo does not endorse any such content. You accept all responsibility f
or security risks and any damage resulting from any content viewed or accessed t
hrough the Products, and Comodo is not responsible for any damage or loss caused
by your use or reliance on any of the content, goods or services, or informatio
n available through third party sources regardless of how presented.</li>
<li>5.4. <u>Submissions.</u> Any communications sent to
Comodo are the property of Comodo or its affiliates. Unless stated otherwise her
ein, submissions are not considered confidential, and Comodo is not liable for a
ny use or disclosure of a submission. Except as noted herein, Comodo is entitled
to unrestricted use of any submissions for any purpose whatsoever without compe
nsation to the provider of the submission.</li>
</ol>
</li>
<li><strong>Payment</strong>
<ol style="list-style-type:none">
<li>6.1. <u>Fees.</u> Certain Products may be used witho
ut payment to Comodo. For other Products, you must pay the fee listed on Comodo’s
website prior to using or accessing the Products. Free and paid for Products are
listed on <a href="www.comodo.com">www.comodo.com</a>. Comodo may modify fees f
or paid products in its sole discretion. Your failure to terminate this agreemen
t after a fee change is posted to Comodo’s website constitutes your acceptance of
amended prices, which will apply upon your renewal of the Products.</li>
<li>6.2. <u>Method of Payment.</u> All fees must be paid
in advance. Comodo may automatically charge the credit card provided for renewi
ng subscriptions to the Products. However, you remain solely responsible for any
renewal payment. If renewal payments are not made before a subscription expires
, Comodo may, without notice, restrict or remove your access to the Products.</l

i>
<li>6.3. <u>Rejected Charges.</u> If any charges are rej
ected by your credit card issuer then Comodo may deactivate your account until p
ayment is successfully received. Comodo may deactivate any account that has a di
sputed charge until Comodo, in its sole discretion, determines the dispute resol
ved.</li>
<li>6.4. <u>Billing Issues.</u> You shall provide Comodo
notice of any billing problems or disputes within 60 days after the charge firs
t appears on a statement you receive from your bank, credit card company, or oth
er billing company. Failure to notify Comodo of the problem within the 60 day pe
riod is your acceptance of the charges. Comodo is not obligated to provide a ref
und for any unused Products.</li>
</ol>
</li>
<li><strong>Restrictions</strong>
<ol style="list-style-type:none">
<li>7.1. <u>Lawful Use.</u> The Products are solely for
lawful purposes and use. You are responsible for ensuring that your use of the P
roducts is in accordance with this agreement and any applicable laws, statutes,
ordinances, regulations, rules and other government authority.</li>
<li>7.2. <u>Compliance.</u> You shall (1) not interfere
or disrupt networks connected to Comodo’s services; (2) comply with all regulation
s, policies and procedures of networks connected to the services; (3) not use th
e Products to infringe the privacy or intellectual property rights of a third pa
rty; (4) not use the Products to distribute or transmit any file that contains m
alware, (5) not attempt to gain unauthorized access to other computer systems; a
nd (6) not use the Products to transmit any unlawful, harassing, libelous, defam
atory, racist, indecent, abusive, violent, threatening, intimidating, harmful, v
ulgar, obscene, offensive or otherwise objectionable material of any kind or nat
ure.</li>
<li>7.3. <u>Export.</u> You represent that you are not l
ocated in and will not modify, export or re-export, either directly or indirectl
y, the Products to any country or entity under United States restrictions or to
any country or entity subject to applicable trade sanctions. The United States r
estricted country and persons list is subject to change without notice from Como
do, and you must comply with the list as it exists in fact. COMODO SHALL NOT BE
LIABLE FOR YOUR VIOLATION OF ANY SUCH EXPORT OR IMPORT LAWS, WHETHER UNDER UNITE
D STATES LAW OR FOREIGN LAW.</li>
</ol>
</li>
<li><strong>Termination</strong>
<ol style="list-style-type:none">
<li>8.1. <u>Term.</u> This agreement is effective until
terminated by you or by Comodo. You may only use paid Products during the period
for which you have paid the subscription fee. The subscription may be renewed b
y paying an additional license fee as set forth on the Comodo website.</li>
<li>8.2. <u>Termination by You.</u> For free software, y
ou may terminate this agreement at any time by removing all copies of the softwa
re in your possession or under your control. All paid Products may be terminated
by removing all copies of any related software and notifying Comodo of your int
ent to terminate this agreement. Notification of termination must be sent by ema
il to <a href="mailto:[email protected]">[email protected]</a>. Your terminati
on will be effective upon Comodo’s receipt and processing of the email. Processing
may take up to 24 hours.</li>
<li>8.3. <u>Termination by Comodo.</u> Comodo may termin
ate this agreement at any time by posting notice of the termination on its websi
te or sending an email to the address provided during your registration for the
Products. Comodo may monitor its systems for excessive consumption of network re
sources and may take technical or other remedies deemed necessary to prevent or
eliminate any excessive consumption. If Comodo deems your use to be excessive, C

omodo may, with email notice, terminate your account or adjust the price of the
Products.</li>
<li>8.4. <u>Refunds.</u> After purchasing the Products,
you may cancel your subscription at any time. Unless you have participated in a
promotion under section 1.6, you may be entitled to a refund. If you cancel your
subscription within the first 30 days after making payment and are eligible for
a refund, Comodo shall refund to you the full amount paid by you. If you cancel
after the first 30 days and your account is listed as an ESM or GeekBuddy busin
ess account, Comodo shall provide you with a pro-rata refund for each month left
on you subscription less any discounts given for pre-payment of fees. To reques
t a refund, you must email <a href="mailto:[email protected]">[email protected]
om</a> within 30 days of the purchase date.</li>
<li>8.5. <u>Events Upon Termination.</u> Upon terminatio
n, you must immediately cease using the Products and delete all copies of any re
lated software found on your computer and any backup copies made. Upon terminati
on, Comodo may disable further use of the Products without further notice and ma
y delete, remove, and erase any account information, any backup data stored by C
omodo, and any other information stored or collected by Comodo. Such deletions a
re in Comodo’s sole discretion and may occur without notice to you. No refunds sha
ll be given for any reason.</li>
</ol>
</li>
<li><strong>Indemnification</strong>
<ol style="list-style-type:none">
<li>9.1. <u>Indemnification.</u> You shall indemnify (i)
Comodo, (ii) Comodo’s affiliates, and (iii) Comodo’s and its affiliate’s directors, o
fficers, employees, and agents (each an "Indemnified Person") against all liabil
ities, losses, expenses, or costs (including reasonable attorney’s fees) (collecti
vely "Losses") that, directly or indirectly, are based on your breach of this ag
reement, information provided by you, or your infringement on the rights of a th
ird party.</li>
<li>9.2. <u>Indemnification Procedure.</u> Comodo shall
notify you promptly of any demand for indemnification. However, Comodo’s failure t
o notify will not relieve you from your indemnification obligations except to th
e extent that the failure to provide timely notice materially prejudices you. Yo
u may assume the defense of any action, suit, or proceeding giving rise to an in
demnification obligation unless assuming the defense would result in potential c
onflicting interests as determined by the Indemnified Person in good faith. You
may not settle any claim, action, suit or proceeding related to this agreement u
nless the settlement also includes an unconditional release of all Indemnified P
ersons from liability.</li>
<li>9.3. <u>Additional Liability.</u> Your indemnificati
on obligations are not Comodo’s sole remedy for a breach and are in addition to an
y other remedies Comodo may have against you under this agreement. Your indemnif
ication obligations survive the termination of this agreement.</li>
</ol>
</li>
<li><strong>Disclaimers and Limitation of Liability</strong>
<ol style="list-style-type:none">
<li>10.1. <u>Internet.</u> You acknowledge that the Prod
ucts are subject to the operation and telecommunications infrastructures of the
Internet and the operation of your Internet connection services, all of which ar
e beyond Comodo’s control.</li>
<li>10.2. <u>Guarantee Disclaimer; Assumption of Risk.</
u> EXCEPT AS SPECIFICALLY STATED OTHERWISE IN THIS AGREEMENT, COMODO EXPRESSLY D
ISCLAIMS ALL IMPLIED AND EXPRESS WARRANTIES IN THE PRODUCTS. THIS DISCLAIMER INC
LUDES ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND N
ON-INFRINGEMENT AND IS EFFECTIVE TO THE MAXIMUM EXTENT ALLOWED BY LAW. COMODO DO
ES NOT GUARANTEE THAT 1) THE PRODUCTS WILL MEET YOUR REQUIREMENTS OR EXPECTATION
S OR 2) THAT ACCESS TO THE PRODUCTS WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ER

ROR-FREE.</li>
<li>10.3. <u>Damage Limitation.</u> THE TOTAL LIABILITY
OF COMODO AND ITS AFFILIATES, AND EACH OF THEIR OFFICERS, DIRECTORS, PARTNERS, E
MPLOYEES, AND CONTRACTORS, RESULTING FROM OR CONNECTED TO THIS AGREEMENT IS LIMI
TED TO THE AMOUNT PAID BY YOU FOR THE PRODUCTS. YOU WAIVE ALL LIABILITY FOR SPEC
IAL, INDIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES. THIS WAIVER INCLUDES ALL DAM
AGES FOR LOST PROFITS, REVENUE, USE, OR DATA AND APPLIES EVEN IF COMODO IS AWARE
OF THE POSSIBILITY OF SUCH DAMAGES. These limitations apply to the maximum exte
nt permitted by law regardless of 1) the reason for or nature of the liability,
including tort claims, 2) the number of claims, 3) the extent or nature of the d
amages, and 4) whether any other provisions of this agreement have been breached
or proven ineffective.</li>
<li>10.4. <u>Data Transfer.</u> ALL MATERIAL AND/OR DATA
DOWNLOADED OR OBTAINED THROUGH THE PRODUCTS IS AT YOUR OWN RISK. YOU ARE SOLELY
RESPONSIBLE FOR THE USE OR YOUR POSSESSION OF SUCH DATA OR MATERIAL. COMODO DOE
S NOT ACTIVELY MONITOR ANY INFORMATION OR MATERIAL TRANSFERRED THROUGH ITS PRODU
CTS AND CANNOT WARRANT THE CONTENT OF SUCH MATERIAL OR DATA.</li>
<li>10.5. <u>Exceptions.</u> If any legal right disallow
s an exclusion of warranties or disallows limiting certain damages, then the dis
claimers of guarantee and limitations on liability herein apply to the maximum e
xtent allowed by law.</li>
<li>10.6. <u>Limitations on Remedy.</u> Except for actio
ns and claims related to a party’s indemnification obligations, all actions or cla
ims relating to this agreement must be brought within one (1) year from the date
when the cause of action occurred.</li>
</ol>
</li>
<li><strong>Privacy</strong>
<ol style="list-style-type:none">
<li>11.1. <u>Privacy Policy.</u> Comodo shall follow the
privacy policy posted on its website at <a href="http://www.comodo.com/reposito
ry/privacy_agreement.html">http://www.comodo.com/repository/privacy_agreement.ht
ml</a> when collecting and using information from you. Comodo may amend the priv
acy policy at any time by posting the amended privacy policy on its website.</li
>
<li>11.2. <u>Disclosure.</u> Comodo will disclose inform
ation where required by a subpoena, interception order or other lawful process.
Comodo may also disclose information when it believes that such disclosure is ne
cessary to protect the rights or safety of others or to enforce, or protect Como
do’s rights under this Agreement.</li>
<li>11.3. <u>Opt Out.</u> You may opt-out of having info
rmation used for purposes not directly related to the Products by emailing a cle
ar notice to <a href="mailto:[email protected]">[email protected]</a>. By clicki
ng "I AGREE", you affirmatively consent to receiving Comodo’s and its affiliates’ pr
omotional material.</li>
<li>11.4. <u>File Submission.</u> This product may autom
atically submit to Comodo any files or programs that are identified as potential
malware, including information on the actions taken by such files. These files
are submitted to Comodo using the Sandbox Settings automatic submission function
. The collected files could contain personally identifiable information that has
been obtained in the file that is identified as potential malware file without
your permission. Files of this type are being collected by Comodo only for the p
urpose of improving the ability of Comodo’s products to detect malicious behavior.
Comodo will not correlate these files with any personally identifiable informat
ion. The automatic submission function may be deactivated by de-selecting this o
ption in the General Settings.</li>
</ol>
</li>
<li><strong>Miscellaneous</strong>
<ol style="list-style-type:none">

<li>12.1. <u>Notices.</u> All questions, notices, demand
s, or requests to Comodo with respect to this Agreement shall be made in English
writing to: Comodo Security Solutions, Inc., 1255 Broad Street, Suite 100, Clif
ton, New Jersey 07013. All notices to you shall be made by posting the notice on
the Comodo website.</li>
<li>12.2. <u>Entire Agreement</u> This agreement, along
with the attached schedules and any documents referred to herein, is the entire
agreement between the parties with respect to the subject matter, superseding al
l other agreements that may exist with respect to the subject matter. Section he
adings are for reference and convenience only and are not part of the interpreta
tion of the agreement.</li>
<li>12.3. <u>Modifications.</u> Comodo may amend or disc
ontinue certain Products offered under this agreement in its sole discretion, in
cluding modifying renewal license fees, availability, equipment and software req
uirements, and limiting or restricting use of Products. Comodo may amend this ag
reement to the extent allowed by law. Comodo will give you notice of these amend
ments by posting the modified agreement to its website. You must periodically vi
sit Comodo’s website to be aware of any changes. Continued use of a Product after
an amendment constitutes your acceptance of the change.</li>
<li>12.4. <u>Waiver.</u> A party’s failure to enforce a pr
ovision of this agreement does not waive the party’s right to enforce the same pro
vision later or right to enforce any other provision of this agreement. To be ef
fective, all waivers must be both in writing and signed by the party benefiting
from the waived provision.</li>
<li>12.5. <u>Force Majeure and Internet Frailties.</u> O
ther than for payment obligations by you, neither party will be liable for a del
ay or failure to perform an obligation to the extent that the delay or failure i
s caused by an occurrence beyond the party s reasonable control. Each party ackn
owledges that the operation of the Internet is beyond the other party’s reasonable
control, and neither party will be liable for a delay or failure caused by an i
nterruption or failure of telecommunication or digital transmission links, Inter
net slow-downs or failures, or other such transmission failure.</li>
<li>12.6. <u>Arbitration and Governing Law.</u> You agre
e that any dispute, claim or controversy arising out of this agreement shall be
determined by binding arbitration. Before you may begin arbitration with respect
to a dispute involving any aspect of this Agreement, you shall notify Comodo an
d any other party to the dispute for the purpose of seeking dispute resolution.
The notice to Comodo should be addressed to 1255 Broad Street, Clifton, New Jers
ey 07013.
<p>
If the dispute is not resolved within si
xty (60) days after the initial notice, then a party may proceed in accordance w
ith the following: Any unresolved dispute arising under the terms of this Agreem
ent shall be decided by arbitration conducted through the services of the Commer
cial Arbitration Rules of the American Arbitration Association (hereinafter refe
rred to as the "AAA"). Notice of demand for an arbitration hearing shall be in w
riting and properly served upon the parties to this Agreement. Arbitration heari
ngs shall be held in the state of New Jersey at a location mutually agreeable to
the parties.
</p>
<p>
The laws of the state of New Jersey gove
rn the interpretation, construction and enforcement of this agreement and all pr
oceedings arising out of it without regard to any conflicts of laws principles.
Both parties agree to the exclusive venue and jurisdiction of state or U.S. fede
ral courts located in New Jersey.
</p>
</li>
<li>12.7. <u>Assignment.</u> You may not assign any of y
our rights or obligations under this agreement, whether by merger, consolidation

, operation of law, or any other manner, without the prior written consent of Co
modo. For purposes of this section only, a change in control is deemed an assign
ment. Any transfer without consent is void. To the extent allowed by law, Comodo
may assign its rights and obligations without your consent.</li>
<li>12.8. <u>Severability.</u> Any provision held invali
d or unenforceable will be reformed to the minimum extent necessary to make the
provision valid and enforceable. If reformation is not possible, the provision i
s deemed omitted and the balance of the agreement remains valid and enforceable.
</li>
<li>12.9. <u>Survival.</u> All provisions relating to co
nfidentiality, proprietary rights, indemnification, and limitations of liability
survive the termination of the agreement.</li>
<li>12.10. <u>Rights of Third Parties.</u> There are no
third party beneficiaries under the agreement.</li>
</ol>
</li>
</ol>
<p><strong>ACCEPTANCE</strong></p>
<p>
BY CLICKING "I ACCEPT" BELOW, YOU AGREE THAT YOU HAVE READ AND UNDERSTAND THIS A
GREEMENT AND THAT YOU WILL BE BOUND BY AND COMPLY WITH ALL OF ITS TERMS. DO NOT
CLICK THE "I ACCEPT" BUTTON IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT.
</p>
<div style="text-align:center"><p><strong>SCHEDULE A<br />OPENVPN LICENSE</stron
g></p></div>
<p>OpenVPN (TM) -- An Open Source VPN daemon</p>
<p>Copyright (C) 2002-2005 OpenVPN Solutions LLC <[email protected]></p>
<p>This distribution contains multiple components, some of which fall under diff
erent licenses. By using OpenVPN or any of the bundled components enumerated be
low, you agree to be bound by the conditions of the license for each respective
component.</p>
<p>OpenVPN trademark</p>
<p> "OpenVPN" is a trademark of OpenVPN Solutions LLC.</p>
<p>OpenVPN license:</p>
<p> OpenVPN is distributed under the GPL license version 2 (see Below).</p>
<p> Special exception for linking OpenVPN with OpenSSL:</p>
<p> In addition, as a special exception, OpenVPN Solutions LLC gives
permission to link the code of this program with the OpenSSL
library (or with modified versions of OpenSSL that use the same
license as OpenSSL), and distribute linked combinations including
the two. You must obey the GNU General Public License in all
respects for all of the code used other than OpenSSL. If you modify
this file, you may extend this exception to your version of the
file, but you are not obligated to do so. If you do not wish to
do so, delete this exception statement from your version.
</p>
<p>LZO license:</p>
<p> LZO is Copyright (C) Markus F.X.J. Oberhumer,
and is licensed under the GPL.
</p>
<p> Special exception for linking OpenVPN with both OpenSSL and LZO:</p>
<p> Hereby I grant a special exception to the OpenVPN project
(<a href="http://openvpn.net/">http://openvpn.net/</a>) to link the LZO librar
y with
the OpenSSL library (<a href="http://www.openssl.org">http://www.openssl.org</
a>).

</p>
<p>Markus F.X.J. Oberhumer</p>
<p>TAP-Win32 Driver license:</p>
<p> The TAP-Win32 driver is derived from the CIPE-Win32
kernel driver, Copyright (C) Damion K. Wilson,
and is licensed under the GPL.
</p>
<p>Windows DDK Samples:</p>
<p> The Windows binary distribution includes devcon.exe, a
Microsoft DDK sample which is redistributed under the terms
of the DDK EULA.
</p>
<p>NSIS License:</p>
<p>Copyright (C) 2002-2003 Joost Verburg</p>
<p>This software is provided as-is , without any express or implied
guarantee. In no event will the authors be held liable for any damages
arising from the use of this software.
</p>
<p> Permission is granted to anyone to use this software for any purpose,
including commercial applications, and to alter it and redistribute
it freely, subject to the following restrictions:
</p>
<ol type="1">
<li>The origin of this software must not be misrepresented;
you must not claim that you wrote the original software.
If you use this software in a product, an acknowledgment in the
product documentation would be appreciated but is not required.
</li>
<li>Altered versions must be plainly marked as such,
and must not be misrepresented as being the original software.
</li>
<li>This notice may not be removed or altered from any distribution.</li
>
</ol>
<p>OpenSSL License:</p>
<p> The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related to OpenSSL
please contact [email protected].
</p>
<p><pre>/* ====================================================================
* Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
*
notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above
*
copyright notice, this list of conditions and the following
*
disclaimer in the documentation and/or other materials
*
provided with the distribution.
*
* 3. All advertising materials mentioning features or use of this
*
software must display the following acknowledgment:
*
"This product includes software developed by the OpenSSL
*
Project for use in the OpenSSL Toolkit.

*
(<a href="http://www.openssl.org/">http://www.openssl.org/</a>)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not
*
be used to endorse or promote products derived from this
*
software without prior written permission. For written
*
permission, please contact [email protected].
*
* 5. Products derived from this software may not be called "OpenSSL"
*
nor may "OpenSSL" appear in their names without prior written
*
permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the
*
following acknowledgment:
*
"This product includes software developed by the OpenSSL
*
Project for use in the OpenSSL Toolkit
*
(<a href="http://www.openssl.org/">http://www.openssl.org/</a>)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS AND
* ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL
* PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
* ==================================================================
*
* This product includes cryptographic software written by Eric Young
* ([email protected]). This product includes software written by
* Tim Hudson ([email protected]).
*
*/
</pre></p>
<p>Original SSLeay License</p>
<p><pre>
/* Copyright (C) 1995-1998 Eric Young ([email protected])
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young ([email protected]).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long
* as the following conditions are aheared to. The following
* conditions apply to all code found in this distribution, be it the
* RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL
* documentation included with this distribution is covered by the
* same copyright terms except that the holder is Tim Hudson
* ([email protected]).
*
* Copyright remains Eric Young s, and as such any Copyright notices
* in the code are not to be removed.
* If this package is used in a product, Eric Young should be given
* attribution as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.

*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
*
notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above
*
copyright notice, this list of conditions and the following
*
disclaimer in the documentation and/or other materials provided
*
with the distribution.
* 3. All advertising materials mentioning features or use of this
*
software must display the following acknowledgement:
*
"This product includes cryptographic software written by
*
Eric Young ([email protected])"
*
The word cryptographic can be left out if the rouines from
*
the library being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative
*
thereof) from the apps directory (application code) you must
*
include an acknowledgement:
*
"This product includes software written by Tim Hudson
*
([email protected])"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR
* OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*
* The licence and distribution terms for any publically available
* version or derivative of this code cannot be changed. i.e. this
* code cannot simply be copied and put under another distribution
* licence [including the GNU Public Licence.]
*/
</pre></p>
<div style="text-align:center"><p><strong>SCHEDULE A<br />CHROMIUM LICENSE</str
ong></p></div>
<p><strong>Included Software and Licenses</strong></p>
<p>The following third party software is distributed with Chromium and is provid
ed under other licenses and/or has source available from other locations. </p>
<p>
<table style="width:70%">
<tr>
<td style="width:25%"><strong>Package Name</strong></td>
<td style="width:45%"><strong>License</strong></td>
</tr>
<tr>
<td>bsdiff</td>
<td><a href="http://fedoraproject.org/wiki/Licensing/BSD_Protect
ion_License">BSD Protection License</a></td>
</tr>
<tr>

<td>bspatch</td>
<td><a href="http://fedoraproject.org/wiki/Licensing/BSD_Protect
ion_License">BSD Protection License</a></td>
</tr>
<tr>
<td>bzip2</td>
<td><a href="http://www.opensource.org/licenses/bsd-license.php"
>BSD license</a></td>
</tr>
<tr>
<td>dtoa</td>
<td><a href="http://www.opensource.org/licenses/bsd-license.php"
>BSD license</a></td>
</tr>
<tr>
<td>hunspell</td>
<td><a href="http://opensource.org/licenses/mozilla1.1.php">MPL
1.1</a>/<a href="http://opensource.org/licenses/gpl-2.0.php">GPL 2.0</a>/<a href
="http://opensource.org/licenses/lgpl-2.1.php">LGPL</a></td>
</tr>
<tr>
<td>ICU</td>
<td><a href="http://www.icu-project.org/repos/icu/icu/trunk/lice
nse.html">ICU license</a></td>
</tr>
<tr>
<td>JSCRE</td>
<td><a href="http://www.opensource.org/licenses/bsd-license.php"
>BSD license</a></td>
</tr>
<tr>
<td>libjpeg</td>
<td><a href="https://github.com/dacap/aseprite/blob/master/docs/
licenses/libjpeg-LICENSE.txt">libjpeg license</a></td>
</tr>
<tr>
<td>libpng</td>
<td><a href="http://www.libpng.org/pub/png/src/libpng-LICENSE.tx
t">libpng license</a></td>
</tr>
<tr>
<td>libxml</td>
<td><a href="http://www.opensource.org/licenses/mit-license.php"
>MIT license </a></td>
</tr>
<tr>
<td>libxslt</td>
<td><a href="http://www.opensource.org/licenses/mit-license.php"
>MIT license </a></td>
</tr>
<tr>
<td>LZMA SDK</td>
<td><a href="http://www.7-zip.org/sdk.html">Special exception li
cense </a></td>
</tr>
<tr>
<td>modp_b64</td>
<td><a href="http://www.opensource.org/licenses/bsd-license.php"
>BSD license</a></td>
</tr>

<tr>
<td>Mozilla interface to Java Plugin APIs</td>
<td><a href="http://opensource.org/licenses/mozilla1.1.php">MPL
1.1</a>/<a href="http://opensource.org/licenses/gpl-2.0.php">GPL 2.0</a>/<a href
="http://opensource.org/licenses/lgpl-2.1.php">LGPL</a></td>
</tr>
<tr>
<td>npapi</td>
<td><a href="http://opensource.org/licenses/mozilla1.1.php">MPL
1.1</a>/<a href="http://opensource.org/licenses/gpl-2.0.php">GPL 2.0</a>/<a href
="http://opensource.org/licenses/lgpl-2.1.php">LGPL</a></td>
</tr>
<tr>
<td>nspr</td>
<td><a href="http://opensource.org/licenses/mozilla1.1.php">MPL
1.1</a>/<a href="http://opensource.org/licenses/gpl-2.0.php">GPL 2.0</a>/<a href
="http://opensource.org/licenses/lgpl-2.1.php">LGPL</a></td>
</tr>
<tr>
<td>nss</td>
<td><a href="http://opensource.org/licenses/mozilla1.1.php">MPL
1.1</a>/<a href="http://opensource.org/licenses/gpl-2.0.php">GPL 2.0</a>/<a href
="http://opensource.org/licenses/lgpl-2.1.php">LGPL</a></td>
</tr>
<tr>
<td>Pthreads for win32</td>
<td><a href="http://www.gnu.org/licenses/lgpl-2.1.html">LGPL 2.1
</a></td>
</tr>
<tr>
<td>sqlite</td>
<td><a href="http://www.sqlite.org/copyright.html">Public domain
</a></td>
</tr>
<tr>
<td>tlslite</td>
<td><a href="http://www.sqlite.org/copyright.html">Public domain
</a></td>
</tr>
<tr>
<td>V8 assembler</td>
<td><a href="http://www.opensource.org/licenses/bsd-license.php"
>BSD license</a></td>
</tr>
<tr>
<td>WebKit</td>
<td><a href="http://www.opensource.org/licenses/bsd-license.php"
>BSD</a>/<a href="http://opensource.org/licenses/lgpl-2.1.php">LGPL 2.1</a></td>
</tr>
<tr>
<td>WTL</td>
<td><a href="http://opensource.org/licenses/ms-pl.html">Microsof
t Permissive License</a></td>
</tr>
<tr>
<td>zlib</td>
<td><a href="http://www.opensource.org/licenses/zlib-license.php
">zlib license</a></td>
</tr>
</table>

</p>

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close