	Release Notes for Command Line Scanner for LINUX
                  	Version 7.0.3
	  	Copyright (C) 2022 Musarubra US LLC.
               	     All Rights Reserved


=====================================================

Thank you for using Command Line Scanner software. This
file contains important information regarding
this release. We recommend that you read the 
entire document.

Please ensure that you update the DAT files on your 
computer to the latest version.

    IMPORTANT:
    Trellix does not support automatic upgrading of a
    pre-release version of the software. To upgrade
    to a later beta release, a release candidate, or
    a production release of the software, you must
    first uninstall the existing version of the 
    software.


______________________________________________________
WHAT'S IN THIS FILE

-   New Features
-   System Requirements
-   Installation
    -   List of Files
    -   Removing the Software
-   Updating DAT Files
-   Known Issues
-   Known Limitation
-   Resolved Issues
-   Documentation
-   Engine End-of-Life (EOL) Program
    -   The Problem
    -   The Solution
    -   The Engine End-Of-Life Program
-   Contact Information
-   Copyright and Trademark Attributions
-   License Information


______________________________________________________
NEW FEATURES

v7.0.3

-	Integration with the new Trellix Anti-Malware Engine 6600
-	Minor bug fixes

v7.0.2

-	Integration with the new Trellix Anti-Malware Engine 6500

v7.0.1

-	Integration with the new Trellix Anti-Malware Engine 6400
-	Base reporting supports JSON format

v7.0.0

-	Integration with the new Trellix Anti-Malware Engine 6300
-	The new MED DATs support, with continuation to support the bigger AVV DATs

______________________________________________________
SYSTEM REQUIREMENTS

Prerequisites:

-   The required version of the LINUX operating system 
    must be installed and running. 

-   You must have root account permissions to install
    the software. 


Disk space and Memory requirements:

-   At least 512 MB of free hard disk space

-   At least an additional 512 MB of free hard disk
    space reserved for temporary files

-   At least 512 MB of RAM for scanning operations 
    (1024 MB recommended minimum)

-   At least 1024 MB of RAM for updating operations


LINUX operating systems:

-   Linux for Intel 32-bit distributions shipping 
    with version 3.x, 4.x or 5.x production kernels 
    (with GLIBC version 2.19+) with both libstdc++.so.5 (for engine) 
    and libstdc++.so.6 installed

-   Linux for Intel 64-bit distributions shipping 
    with version 2.6, 3.x, 4.x or 5.x production kernels, 
    with libstdc++.so.6 installed


_________________________________________________________
INSTALLATION

1.  Download the appropriate distribution package for 
    your LINUX system to a temporary directory on your 
    computer.

    The distributions for evaluation or licensed 
    versions according to their operating systems are:
   ------------------------------------------------------
   Operating System		Package Name
   ------------------------------------------------------
   EVALUATION
       
       Linux            	cls-l32-703-e.tar.gz
       Linux 64-bit     	cls-l64-703-e.tar.gz

    LICENSED
      
       Linux            	cls-l32-703-l.tar.gz
       Linux 64-bit     	cls-l64-703-l.tar.gz


2.  Change to the directory where you downloaded
    your distribution package, then run the following
    commands:

      gunzip <package name>

      tar -xf <package name>

    Replace <package name> with the actual package 
    that you downloaded (without angled brackets).

    NOTE:
    The letter case of the package file might change
    while downloading the package. Check that the
    file name ends with an uppercase Z.

3.  Run the following at the command prompt:

      ./install-uvscan <installation directory>

    Replace <installation directory> with the target
    directory where you want to install the software 
    (without angled brackets). 
    
    The default installation directory is 
    /usr/local/uvscan.

    If the target installation directory that
    you specify does not exist, the script prompts you
    to create it.

    NOTE:
    To create an installation directory for the
    software, you must have the necessary WRITE
    and EXECUTE permissions.

    The script also prompts you to create symbolic links
    to the uvscan binary, the shared library, and man
    pages. We recommend that you create the default 
    links as shown in the wizard.

4.  If you do not want to create the default links or
    use a standard directory, set an environment 
    variable to the installation directory that you
    specified.
    The environment variables for the supported operating
    systems are:
   --------------------------------------------------------
    Operating System	 	Environment Variable
   --------------------------------------------------------
    Linux                	LD_LIBRARY_PATH
    Linux 64-bit         	LD_LIBRARY_PATH


LIST OF FILES

The following files reside in the installation
directory of each distribution of the software.
   --------------------------------------------------------
    Filename		 	Details
   --------------------------------------------------------
    install-uvscan       	Installation script file
    uninstall-uvscan     	Uninstallation script file
    uvscan               	Executable file
    uvscan_secure        	Script, uses --secure option
    uvscancore           	Scan component
    config.dat           	Engine file
    license.dat          	License file 
    cls703upg.pdf        	Product Guide
    license.txt          	License information
    readme.txt           	This file
    signlic.txt          	Third-party license information
    uvscan.1             	On-line help, 'man' pages
    
    libstdc++.so.6.0.8   	Support file
    libgcc_s.so.1        	Support file
    libstdc++.so.6       	Support file
    libgcc_s.a           	Support file
    libstdc++.a          	Support file
    
    
    

The installation adds one of the following library 
files to the installation directory, based on the 
distribution selected:

   ---------------------------------------------------
    Operating System	 	Filename
   ---------------------------------------------------
    Linux                	liblnxfv.so.4
    Linux 64-bit         	liblnxfv.so.4


The installation also adds one of the following symbolic 
links to the library, where required:
   ---------------------------------------------------
    Operating System	 	Symbolic link
   ---------------------------------------------------
    Linux                	liblnxfv.so
    Linux 64-bit         	liblnxfv.so


REMOVING THE SOFTWARE 

To remove the software by a script: 

1.  Change to the directory where you installed the
    software, then run the following command to start
    the uninstallation:

      ./uninstall-uvscan

2.  Follow the on-screen instructions and respond to 
    any prompts shown in the script to remove the
    program files from your computer.

3.  Delete the script uninstall-uvscan. 


To remove the software manually:

1.  Change to the directory where you installed the
    software.

2. Use the rm command to remove all the files 
   in that directory.

   If you created any symbolic links when you 
   installed the software, then you must delete 
   them manually to remove the software 
   completely from your computer.

   NOTE:
   To see a list of the files for each 
   LINUX distribution, see the "List of Files" section
   In this file.

__________________________________________________________
UPDATING DAT FILES

The DAT files are not included with the Command Line 
Scanner package and need to be separately downloaded and 
copied to the location where the Command Line Scanner is 
installed.

DAT files are contained in a single compressed file that 
one can download from the Internet.

1.  Navigate to the URL 
    https://update.nai.com/products/commonupdater/current/vscandat1000/dat/0000/

2.  Look for a filename that is of the format 
    avvdat-nnnn.zip, where nnnn is the DAT version number. 
    This file contains the DAT files, compressed in ZIP 
    format.

The number given to the file changes on a regular basis.
A higher number indicates a later version of the DAT files.

To use the new DAT files:

1.  Create a download directory.

2.  Change to the download directory, and download the
    new compressed avvdat-nnnn.zip file.

3.  To extract the DAT files, type the command:

	unzip <file>

    Here, file is the name of the zip file you downloaded.

4.  Type the following command to move the DAT files 
    to the directory where your software is installed. 
    Name the file using lower case.

        mv *.dat installation-directory

    Here, installation-directory is the directory where
    you installed the software.

Your computer overwrites the old DAT files with the new 
files. Your Anti-Malware software will now use the new DAT 
files to scan for viruses.

Please refer to the command line scanner product guide
for a sample update script to automate downloading the
updated DAT files from the Trellix website.

__________________________________________________________
KNOWN ISSUES

1.  ISSUE:
    When mail clients using mailbox format similar to 
    concatenated MIME are scanned with MIME detection 
    enabled, they might result in unexpected errors such
    as "Files could not be opened".

    WORKAROUND:
    Exclude these files from scanning, or 
    use the --mailbox switch with --mime.

2.  ISSUE:
    The anti-malware Engine might need a large amount of 
    data space to decompress the heavily compressed files.  
    
    WORKAROUND: 
    Set the system's hard and soft data segment size 
    limits to "unlimited" or as large as possible. 
    Refer to the system's documentation for the 
    maximum size allowed for your environment.

3.  ISSUE:
    Scanning the content directories that do not 
    exist on disk (such as /proc, /sys, or /dev) might
    result in unwanted issues. 

    WORKAROUND:
    Exclude these directories from scanning using 
    the --exclude switch.

__________________________________________________________
KNOWN LIMITATION

EOL Platform:
- N/A for this release

__________________________________________________________
RESOLVED ISSUES

v7.0.3
	VSCL-252 : CLS: Json Report only contains backslashes

v7.0.2
	None

v7.0.1
	None

v7.0.0
	None

__________________________________________________________
DOCUMENTATION

Documentation is included on the product package
and/or is available with a valid grant number
from the Trellix download site:

      https://www.trellix.com/en-us/downloads.html

   NOTE:
   Electronic copies of all product manuals are
   saved as Adobe Acrobat .PDF files. You can download 
   any version of Acrobat Reader from the Adobe website:

      https://get.adobe.com/reader/

This product includes the following documentation set:

-   Product Guide
    Introduces the product, describes product
    features, provides detailed instructions for
    configuring the software, deployment, and
    ongoing operation and maintenance.

-   Help system
    A Help file ('man' pages), accessed from
    within the software application, provides
    quick descriptions of the options.

-   A LICENSE Agreement
    The terms under which you may use the
    product. Read it carefully. If you install
    the product, you agree to the license
    terms.
 
-   Release Notes
    This README file.


__________________________________________________________
ENGINE END-OF-LIFE (EOL) PROGRAM

Your Anti-Malware software is only as good as its last
update!

Updating your DAT files and Anti-Malware Engine regularly
is essential and a MUST!

Sometimes architectural changes to the way that
the DAT files and Anti-Malware Engine work
together make it critical for you to update your
engine: an old engine WILL NOT catch some of today's
threats.

Trellix Advanced Research Center recommends having as part of your
Security Policy Program, an Engine Update process to
take advantage of the latest technology and stay
protected!


THE PROBLEM

Thousands of new detections are added to the
DAT files daily by Trellix Advanced Research Center. If you are not
up-to-date, you are vulnerable to any one of them
that gets a foothold in the field (also known as "in
the wild").

Trellix Advanced Research Center releases regular DAT files,
ensuring that full protection is added to all Trellix
products. The DAT files contain the information
required to detect and remove threats - what to look
for and where to look for it.

However, today's threats are evolving almost on a
daily basis. Software providers continue to make
changes to operating systems and applications that
can change the way a program acts or works, and a
Anti-Malware program may not understand the
changes.


THE SOLUTION

Taking this into account, Trellix regularly
updates its Anti-Malware Engine used by ALL Trellix
virus-detection and removal products. The
engine understands all the different structures in
which a virus could lurk - EXE files, Microsoft
Office files, Linux files, and so on. Occasionally
these changes require us to make significant
architectural changes to the engine as well as the
DAT files.

Trellix Advanced Research Center strongly recommends that users of ALL Trellix
Anti-Malware products update the engine in the 
products they have deployed as part of a
sound security best-practices program.

THE ENGINE END-OF-LIFE PROGRAM

To ensure protection from the evolving malicious code
threat, users should update as soon as possible upon
the release of Trellix's latest Anti-Malware Engine.

Engines begin their End of Life Process once a new
Engine version is released. Upon release of the new
engine version, the previous engine will be supported
for at most an additional 6 months, at the end of which
you will not be able to receive any further support on
the previous version.

Information on the Trellix Engine End-of-Life policy 
and a full list of supported engines and products 
can be found at:

       https://kcm.trellix.com/corporate/index?page=content&id=KB92680 

__________________________________________________________
CONTACT INFORMATION

    Trellix Advanced Research Center Home Page
       https://www.trellix.com/en-us/advanced-research-center.html

    Trellix Advanced Research Center Threat Library
       https://www.trellix.com/en-us/advanced-research-center.html

    Submit a Virus Sample
      https://kcm.trellix.com/corporate/index?page=content&id=KB68030

    DAT Notification Service
       https://www.trellix.com/en-us/contact-us/sns-preferences.html

DOWNLOAD SITE
    Home Page
       https://www.trellix.com/en-us/downloads.html

    Product Upgrades
       https://www.trellix.com/en-us/downloads/my-products.html

       Valid grant number required (contact Customer Service)

    Product End-of-Life Support
		https://kcm.trellix.com/corporate/index?page=content&id=KB92680


TECHNICAL SUPPORT
    Home Page
       https://www.trellix.com/en-us/support.html

    KnowledgeBase Search
       https://supportm.trellix.com/webcenter/portal/supportportal/pages_knowledgecenter

    Trellix Technical Support ServicePortal (Logon credentials required)
       https://supportm.trellix.com/

    Trellix Support Notification Service  (SNS)
       https://www.trellix.com/en-us/contact-us/sns-preferences.html


CUSTOMER SERVICE
    Web:      https://www.trellix.com/en-us/contact-us.html


WORLDWIDE OFFICES
       https://www.trellix.com/en-us/contact-us.html

_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (C) 2022 Musarubra US LLC.
Trellix, FireEye and Skyhigh Security are the trademarks or registered trademarks of Musarubra US LLC, 
FireEye Security Holdings US LLC and their affiliates in the US and /or other countries.
McAfee is the trademark or registered trademark of McAfee LLC or its subsidiaries in the US and /or other countries.
Other names and brands are the property of these companies or may be claimed as the property of others.

_____________________________________________________
LICENSE INFORMATION

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF
YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO TRELLIX (MUSARUBRA US LLC) OR THE PLACE OF
PURCHASE FOR A FULL REFUND.


LICENSE ATTRIBUTIONS

This product includes or may include:

* Software originally written by Philip Hazel,
Copyright (c) 1997-2008 University of Cambridge. A
copy of the license agreement for this software can
be found at www.pcre.org/license.txt * This product 
includes software developed by the OpenSSL Project 
for use in the OpenSSL Toolkit (http://www.openssl.org/).
* Cryptographic software written by Eric A. Young
and software written by Tim J. Hudson. * Some
software programs that are licensed (or sublicensed)
to the user under the GNU General Public License
(GPL) or other similar Free Software licenses which,
among other rights, permit the user to copy, modify
and redistribute certain programs, or portions
thereof, and have access to the source code. The GPL
requires that for any software covered under the
GPL, which is distributed to someone in an
executable binary format, that the source code also
be made available to those users. For any such
software covered under the GPL, the source code is
made available on this CD. If any Free Software
licenses require that Trellix provide rights to use,
copy or modify a software program that are broader
than the rights granted in this agreement, then such
rights shall take precedence over the rights and
restrictions herein. * Software originally written
by Henry Spencer, Copyright 1992, 1993, 1994, 1997
Henry Spencer. * Software originally written by
Robert Nordier, Copyright (C) 1996-7 Robert Nordier.
* Software written by Douglas W. Sauder. * Software
developed by the Apache Software Foundation
(http://www.apache.org/). A copy of the license
agreement for this software can be found at
www.apache.org/licenses/LICENSE-2.0.txt.
* International Components for Unicode ("ICU")
Copyright (C) 1995-2002 International Business
Machines Corporation and others. * Software
developed by CrystalClear Software, Inc., Copyright
(C) 2000 CrystalClear Software, Inc. * FEAD(R)
Optimizer(R) technology, Copyright Netopsystems AG,
Berlin, Germany. * Outside In(R) Viewer Technology
(C) 1992-2001 Stellent Chicago, Inc. and/or Outside
In(R) HTML Export, (C) 2001 Stellent Chicago, Inc.
* Software copyrighted by Thai Open Source Software
Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000.
* Software copyrighted by Expat maintainers.
* Software copyrighted by The Regents of the
University of California, (C) 1996, 1989, 1998-2000.
* Software copyrighted by Gunnar Ritter. * Software
copyrighted by Sun Microsystems, Inc., 4150 Network
Circle, Santa Clara, California 95054, U.S.A., (C)
2003. * Software copyrighted by Gisle Aas. (C)
1995-2003. * Software copyrighted by Michael A.
Chase, (C) 1999-2000. * Software copyrighted by Neil
Winton, (C) 1995-1996. * Software copyrighted by RSA
Data Security, Inc., (C) 1990-1992. * Software
copyrighted by Sean M. Burke, (C) 1999, 2000.
* Software copyrighted by Martijn Koster, (C) 1995.
* Software copyrighted by Brad Appleton, (C)
1996-1999. * Software copyrighted by Michael G.
Schwern, (C) 2001. * Software copyrighted by Graham
Barr, (C) 1998. * Software copyrighted by Larry Wall
and Clark Cooper, (C) 1998-2000. * Software
copyrighted by Frodo Looijaard, (C) 1997. * Software
copyrighted by the Python Software Foundation,
Copyright (C) 2001, 2002, 2003. A copy of the
license agreement for this software can be found at
www.python.org. * Software copyrighted by Beman
Dawes, (C) 1994-1999, 2002. * Software written by
Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek (C)
1997-2000 University of Notre Dame. * Software
copyrighted by Simone Bordet & Marco Cravero, (C)
2002. * Software copyrighted by Stephen Purcell, (C)
2001. * Software developed by the Indiana University
Extreme! Lab (http://www.extreme.indiana.edu/).
* Software copyrighted by International Business
Machines Corporation and others, (C) 1995-2003.
* Software developed by the University of
California, Berkeley and its contributors.
* Software developed by Ralf S. Engelschall
<rse@engelschall.com> for use in the mod_ssl project
(http://www.modssl.org/). * Software copyrighted by
Kevlin Henney, (C) 2000-2002. * Software copyrighted
by Peter Dimov and Multi Media Ltd. (C) 2001, 2002.
* Software copyrighted by David Abrahams, (C) 2001,
2002. See http://www.boost.org/libs/bind/bind.html
for documentation. * Software copyrighted by Steve
Cleary, Beman Dawes, Howard Hinnant & John Maddock,
(C) 2000. * Software copyrighted by Boost.org, (C)
1999-2002. * Software copyrighted by Nicolai M.
Josuttis, (C) 1999. * Software copyrighted by Jeremy
Siek, (C) 1999-2001. * Software copyrighted by
Daryle Walker, (C) 2001. * Software copyrighted by
Chuck Allison and Jeremy Siek, (C) 2001, 2002.
* Software copyrighted by Samuel Krempp, (C) 2001.
See http://www.boost.org for updates, documentation,
and revision history. * Software copyrighted by Doug
Gregor (gregod@cs.rpi.edu), (C) 2001, 2002.
* Software copyrighted by Cadenza New Zealand Ltd.,
(C) 2000. * Software copyrighted by Jens Maurer,
(C) 2000, 2001. * Software copyrighted by Jaakko
Jarvi (jaakko.jarvi@cs.utu.fi), (C) 1999, 2000.
* Software copyrighted by Ronald Garcia, (C) 2002.
* Software copyrighted by David Abrahams, Jeremy
Siek, and Daryle Walker, (C) 1999-2001. * Software
copyrighted by Stephen Cleary (shammah@voyager.net),
(C) 2000. * Software copyrighted by Housemarque Oy
<http://www.housemarque.com>, (C) 2001. * Software
copyrighted by Paul Moore, (C) 1999. * Software
copyrighted by Dr. John Maddock, (C) 1998-2002.
* Software copyrighted by Greg Colvin and Beman
Dawes, (C) 1998, 1999. * Software copyrighted by
Peter Dimov, (C) 2001, 2002. * Software copyrighted
by Jeremy Siek and John R. Bandela, (C) 2001.
* Software copyrighted by Joerg Walter and Mathias
Koch, (C) 2000-2002. * Software copyrighted by
Carnegie Mellon University (C) 1989, 1991, 1992.
* Software copyrighted by Cambridge Broadband Ltd.,
(C) 2001-2003. * Software copyrighted by Sparta,
Inc., (C) 2003-2004. * Software copyrighted by
Cisco, Inc and Information Network Center of Beijing
University of Posts and Telecommunications, (C)
2004. * Software copyrighted by Simon Josefsson, (C)
2003. * Software copyrighted by Thomas Jacob, (C)
2003-2004. * Software copyrighted by Advanced
Software Engineering Limited, (C) 2004. * Software
copyrighted by Todd C. Miller, (C) 1998. * Software
copyrighted by The Regents of the University of
California, (C) 1990, 1993, with code derived from
software contributed to Berkeley by Chris Torek.

The following 3rd-party software terms apply or 
may apply:

Boost Software License - Version 1.0 - August 17th, 2003
--------------------------------------------------------

Permission is hereby granted, free of charge, 
to any person or organization obtaining a copy of 
the software and accompanying documentation covered 
by this license (the "Software") to use, reproduce, 
display, distribute, execute, and transmit the 
Software, and to prepare derivative works of the 
Software, and to permit third-parties to whom the 
Software is furnished to do so, all subject to the 
following:

The copyright notices in the Software and this entire 
statement, including the above license grant, this 
restriction and the following disclaimer, must be 
included in all copies of the Software, in whole or
in part, and all derivative works of the Software, 
unless such copies or derivative works are solely in 
the form of machine-executable object code generated 
by a source language processor.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF 
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED 
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A 
PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO 
EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING 
THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER 
LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, 
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE 
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.


PCRE LICENCE
------------
PCRE is a library of functions to support regular 
expressions whose syntax and semantics are as close as 
possible to those of the Perl 5 language.

Release 7 of PCRE is distributed under the terms of 
the "BSD" licence, as specified below. The 
documentation for PCRE, supplied in the "doc" 
directory, is distributed under the same terms as 
the software itself.

The basic library functions are written in C and 
are freestanding. Also included in the distribution 
is a set of C++ wrapper functions.


THE BASIC LIBRARY FUNCTIONS
---------------------------
Written by:        Philip Hazel
Email local part:  ph10
Email domain:      cam.ac.uk

University of Cambridge Computing Service, Cambridge, England.

Copyright (c) 1997-2007 University of Cambridge. All rights reserved.


THE C++ WRAPPER FUNCTIONS
-------------------------
Contributed by:    Google Inc.

Copyright (c) 2007, Google Inc. All rights reserved.


THE "BSD" LICENCE
-----------------
Redistribution and use in source and binary forms, 
with or without modification, are permitted provided 
that the following conditions are met:

* Redistributions of source code must retain the 
above copyright notice, this list of conditions and 
the following disclaimer.

* Redistributions in binary form must reproduce the 
above copyright notice, this list of conditions and the 
following disclaimer in the documentation and/or other 
materials provided with the distribution.

* Neither the name of the University of Cambridge nor 
the name of Google Inc. nor the names of their 
contributors may be used to endorse or promote products 
derived from this software without specific prior 
written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND 
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED 
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL 
THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY 
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF 
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER 
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE 
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 
POSSIBILITY OF SUCH DAMAGE.


             GNU GENERAL PUBLIC LICENSE
                Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA
02110-1301 USA
Everyone is permitted to copy and distribute
verbatim copies of this license document, but
changing it is not allowed.

                      Preamble

The licenses for most software are designed to take
away your freedom to share and change it. By
contrast, the GNU General Public License is intended
to guarantee your freedom to share and change free
software--to make sure the software is free for all
its users.  This General Public License applies to
most of the Free Software Foundation's software and
to any other program whose authors commit to using
it.  (Some other Free Software Foundation software
is covered by the GNU Lesser General Public License
instead.)  You can apply it to your programs, too.

When we speak of free software, we are referring to
freedom, not price.  Our General Public Licenses are
designed to make sure that you have the freedom to
distribute copies of free software (and charge for
this service if you wish), that you receive source
code or can get it if you want it, that you can
change the software or use pieces of it in new free
programs; and that you know you can do these
things.

To protect your rights, we need to make restrictions
that forbid anyone to deny you these rights or to
ask you to surrender the rights. These restrictions
translate to certain responsibilities for you if you
distribute copies of the software, or if you modify
it.

For example, if you distribute copies of such a
program, whether gratis or for a fee, you must give
the recipients all the rights that you have.  You
must make sure that they, too, receive or can get
the source code.  And you must show them these terms
so they know their rights.

We protect your rights with two steps: (1) copyright
the software, and (2) offer you this license which
gives you legal permission to copy, distribute
and/or modify the software.

Also, for each author's protection and ours, we want
to make certain that everyone understands that there
is no warranty for this free software.  If the
software is modified by someone else and passed on,
we want its recipients to know that what they have
is not the original, so that any problems introduced
by others will not reflect on the original authors'
reputations.

Finally, any free program is threatened constantly
by software patents.  We wish to avoid the danger
that redistributors of a free program will
individually obtain patent licenses, in effect
making the program proprietary.  To prevent this, we
have made it clear that any patent must be licensed
for everyone's free use or not licensed at all.

The precise terms and conditions for copying,
distribution and modification follow.

             GNU GENERAL PUBLIC LICENSE
 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
                    MODIFICATION

0. This License applies to any program or other work
which contains a notice placed by the copyright
holder saying it may be distributed under the terms
of this General Public License.  The "Program",
below, refers to any such program or work, and a
"work based on the Program" means either the Program
or any derivative work under copyright law: that is
to say, a work containing the Program or a portion
of it, either verbatim or with modifications and/or
translated into another language.  (Hereinafter,
translation is included without limitation in the
term "modification".)  Each licensee is addressed as
"you".

Activities other than copying, distribution and
modification are not covered by this License; they
are outside its scope.  The act of running the
Program is not restricted, and the output from the
Program is covered only if its contents constitute a
work based on the Program (independent of having
been made by running the Program). Whether that is
true depends on what the Program does.

1. You may copy and distribute verbatim copies of
the Program's source code as you receive it, in any
medium, provided that you conspicuously and
appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep
intact all the notices that refer to this License
and to the absence of any warranty; and give any
other recipients of the Program a copy of this
License along with the Program.

You may charge a fee for the physical act of
transferring a copy, and you may at your option
offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program
or any portion of it, thus forming a work based on
the Program, and copy and distribute such
modifications or work under the terms of Section 1
above, provided that you also meet all of these
conditions:

a) You must cause the modified files to carry
prominent notices stating that you changed the files
and the date of any change.

b) You must cause any work that you distribute or
publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be
licensed as a whole at no charge to all third
parties under the terms of this License.

c) If the modified program normally reads commands
interactively when run, you must cause it, when
started running for such interactive use in the most
ordinary way, to print or display an announcement
including an appropriate copyright notice and a
notice that there is no warranty (or else, saying
that you provide a warranty) and that users may
redistribute the program under these conditions, and
telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but
does not normally print such an announcement, your
work based on the Program is not required to print
an announcement.)

These requirements apply to the modified work as a
whole.  If identifiable sections of that work are
not derived from the Program, and can be reasonably
considered independent and separate works in
themselves, then this License, and its terms, do not
apply to those sections when you distribute them as
separate works.  But when you distribute the same
sections as part of a whole which is a work based on
the Program, the distribution of the whole must be
on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus
to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim
rights or contest your rights to work written
entirely by you; rather, the intent is to exercise
the right to control the distribution of derivative
or collective works based on the Program.

In addition, mere aggregation of another work not
based on the Program with the Program (or with a
work based on the Program) on a volume of a storage
or distribution medium does not bring the other work
under the scope of this License.

3. You may copy and distribute the Program (or a
work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2
above provided that you also do one of the
following:

a) Accompany it with the complete corresponding
machine-readable source code, which must be
distributed under the terms of Sections 1 and 2
above on a medium customarily used for software
interchange; or,

b) Accompany it with a written offer, valid for at
least three years, to give any third party, for a
charge no more than your cost of physically
performing source distribution, a complete
machine-readable copy of the corresponding source
code, to be distributed under the terms of Sections
1 and 2 above on a medium customarily used for
software interchange; or,

c) Accompany it with the information you received as
to the offer to distribute corresponding source
code.  (This alternative is allowed only for
noncommercial distribution and only if you received
the program in object code or executable form with
such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form
of the work for making modifications to it.  For an
executable work, complete source code means all the
source code for all modules it contains, plus any
associated interface definition files, plus the
scripts used to control compilation and installation
of the executable.  However, as a special exception,
the source code distributed need not include
anything that is normally distributed (in either
source or binary form) with the major components
(compiler, kernel, and so on) of the operating
system on which the executable runs, unless that
component itself accompanies the executable.

If distribution of executable or object code is made
by offering access to copy from a designated place,
then offering equivalent access to copy the source
code from the same place counts as distribution of
the source code, even though third parties are not
compelled to copy the source along with the object
code.

4. You may not copy, modify, sublicense, or
distribute the Program except as expressly provided
under this License.  Any attempt otherwise to copy,
modify, sublicense or distribute the Program is
void, and will automatically terminate your rights
under this License. However, parties who have
received copies, or rights, from you under this
License will not have their licenses terminated so
long as such parties remain in full compliance.

5. You are not required to accept this License,
since you have not signed it.  However, nothing else
grants you permission to modify or distribute the
Program or its derivative works.  These actions are
prohibited by law if you do not accept this License.
Therefore, by modifying or distributing the Program
(or any work based on the Program), you indicate
your acceptance of this License to do so, and all
its terms and conditions for copying, distributing
or modifying the Program or works based on it.

6. Each time you redistribute the Program (or any
work based on the Program), the recipient
automatically receives a license from the original
licensor to copy, distribute or modify the Program
subject to these terms and conditions.  You may not
impose any further restrictions on the recipients'
exercise of the rights granted herein. You are not
responsible for enforcing compliance by third
parties to this License.

7. If, as a consequence of a court judgment or
allegation of patent infringement or for any other
reason (not limited to patent issues), conditions
are imposed on you (whether by court order,
agreement or otherwise) that contradict the
conditions of this License, they do not excuse you
from the conditions of this License.  If you cannot
distribute so as to satisfy simultaneously your
obligations under this License and any other
pertinent obligations, then as a consequence you may
not distribute the Program at all.  For example, if
a patent license would not permit royalty-free
redistribution of the Program by all those who
receive copies directly or indirectly through you,
then the only way you could satisfy both it and this
License would be to refrain entirely from
distribution of the Program.

If any portion of this section is held invalid or
unenforceable under any particular circumstance, the
balance of the section is intended to apply and the
section as a whole is intended to apply in other
circumstances.

It is not the purpose of this section to induce you
to infringe any patents or other property right
claims or to contest validity of any such claims;
this section has the sole purpose of protecting the
integrity of the free software distribution system,
which is implemented by public license practices.
Many people have made generous contributions to the
wide range of software distributed through that
system in reliance on consistent application of that
system; it is up to the author/donor to decide if he
or she is willing to distribute software through any
other system and a licensee cannot impose that
choice.

This section is intended to make thoroughly clear
what is believed to be a consequence of the rest of
this License.

8. If the distribution and/or use of the Program is
restricted in certain countries either by patents or
by copyrighted interfaces, the original copyright
holder who places the Program under this License may
add an explicit geographical distribution limitation
excluding those countries, so that distribution is
permitted only in or among countries not thus
excluded.  In such case, this License incorporates
the limitation as if written in the body of this
License.

9. The Free Software Foundation may publish revised
and/or new versions of the General Public License
from time to time.  Such new versions will be
similar in spirit to the present version, but may
differ in detail to address new problems or
concerns.

Each version is given a distinguishing version
number.  If the Program specifies a version number
of this License which applies to it and "any later
version", you have the option of following the terms
and conditions either of that version or of any
later version published by the Free Software
Foundation.  If the Program does not specify a
version number of this License, you may choose any
version ever published by the Free Software
Foundation.

10. If you wish to incorporate parts of the Program
into other free programs whose distribution
conditions are different, write to the author to ask
for permission.  For software which is copyrighted
by the Free Software Foundation, write to the Free
Software Foundation; we sometimes make exceptions
for this.  Our decision will be guided by the two
goals of preserving the free status of all
derivatives of our free software and of promoting
the sharing and reuse of software generally.

                     NO WARRANTY

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION.

12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR
ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL
OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH
ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.

             END OF TERMS AND CONDITIONS

    How to Apply These Terms to Your New Programs

If you develop a new program, and you want it to be
of the greatest possible use to the public, the best
way to achieve this is to make it free software
which everyone can redistribute and change under
these terms.

To do so, attach the following notices to the
program.  It is safest to attach them to the start
of each source file to most effectively convey the
exclusion of warranty; and each file should have at
least the "copyright" line and a pointer to where
the full notice is found.

<one line to give the program's name and a brief
idea of what it does.>
Copyright (C) <year>  <name of author>

This program is free software; you can redistribute
it and/or modify it under the terms of the GNU
General Public License as published by the Free
Software Foundation; either version 2 of the
License, or (at your option) any later version.

This program is distributed in the hope that it will
be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE.  See the GNU General
Public License for more details.

You should have received a copy of the GNU General
Public License along with this program; if not,
write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA
02110-1301 USA.

Also add information on how to contact you by
electronic and paper mail.

If the program is interactive, make it output a
short notice like this when it starts in an
interactive mode:

Gnomovision version 69, Copyright (C) year name of
author Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free
software, and you are welcome to redistribute it
under certain conditions; type `show c' for
details.

The hypothetical commands `show w' and `show c'
should show the appropriate parts of the General
Public License.  Of course, the commands you use may
be called something other than `show w' and `show
c'; they could even be mouse-clicks or menu
items--whatever suits your program.

You should also get your employer (if you work as a
programmer) or your school, if any, to sign a
"copyright disclaimer" for the program, if
necessary.  Here is a sample; alter the names:

Yoyodyne, Inc., hereby disclaims all copyright
interest in the program `Gnomovision' (which makes
passes at compilers) written by James Hacker.

<signature of Ty Coon>, 1 April 1989
Ty Coon, President of Vice

This General Public License does not permit
incorporating your program into proprietary
programs.  If your program is a subroutine library,
you may consider it more useful to permit linking
proprietary applications with the library.  If this
is what you want to do, use the GNU Lesser General
Public License instead of this License.



DBN 011-EN 
RMID WINDOWS
Deriv. V3.1.4

